DocumentCode :
8150
Title :
Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
Author :
Cilardo, Alessandro ; Mazzocca, Nicola
Author_Institution :
Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Napoli, Italy
Volume :
8
Issue :
5
fYear :
2013
fDate :
May-13
Firstpage :
810
Lastpage :
820
Abstract :
Cryptanalysis, i.e., the study of methods for breaking cryptographic algorithms, can greatly benefit from hardware acceleration as a key aspect enabling high-performance attacks. This work investigates the new opportunities inherently provided by a particular class of hardware technologies, i.e., reconfigurable hardware devices, addressing the cryptanalysis of the SHA-1 hash function as a case study. We show how hardware reconfiguration enables some unexplored approaches such as algorithm and architecture exploration, as well as on-the-fly system specialization relying on hardware programmability. We also identify some new cryptanalysis methods, including two novel techniques for SHA-1 cryptanalysis called interbit constraints and constraint relaxation. Relying on the proposed approaches, we designed an FPGA-based platform targeting 71- and 75-round versions of SHA-1. Under the same cost budget, the estimated times for a collision achieved by the platform are at least one order of magnitude lower than other solutions based on high-end supercomputing facilities, reaching the highest performance/cost ratio for SHA-1 collision search and providing a striking confirmation of the impact of hardware reconfigurability.
Keywords :
Cryptography; Field programmable gate arrays; Reconfigurable logic; Cryptography; field-programmable gate arrays (FPGAs); reconfigurable logic;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2013.2256898
Filename :
6494288
Link To Document :
بازگشت