Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Background  





2 Algorithm and Analysis  





3 Deployment  





4 References  














FORK-256







Add links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


FORK-256 is a hash algorithm designed in response to security issues discovered in the earlier SHA-1 and MD5 algorithms. After substantial cryptanalysis, the algorithm is considered broken.

Background

[edit]

In 2005, Xiaoyun Wang announced an order- collision attack on the government's hash standard SHA-1.[1][2] The National Institute of Standards and Technology (NIST), the body responsible for setting cryptographic standards in the United States, concluded this was a practical attack (as previous estimates were order-) and began encouraging additional research into hash functions and their weaknesses.[3] As part of this effort, NIST hosted two workshops where potential new algorithms, including FORK-256, were introduced and discussed.[4] Rather than immediately select any of these algorithms, NIST conducted a public competition from 2007–2012 which ultimately resulted in the Keccak algorithm being selected for use as the SHA-3 standard.[5]

Algorithm and Analysis

[edit]

FORK-256 was introduced at the 2005 NIST Hash workshop and published the following year.[6] FORK-256 uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.

The initial algorithm garnered significant cryptanalysis, summarized in (Saarinen 2007).[7] Matusiewicz et al. (2006) discovered a collision attack with complexityof.[8] Mendel et al. (2006) independently derived a similar attack.[9] The following year Matusiewicz's team improved their attack to no worse than [10] and (Contini 2007) demonstrated a practical implementation of the attack.[11]

In response to these attacks, Hong and his team proposed an improved version of FORK-256.[12] Markku-Juhani Saarinen derived a -complexity attack again the improved algorithm.[7] By way of comparison, the eventual SHA-3 standard withstands up to an order- attack.[citation needed]

Deployment

[edit]

FORK-256 was added to the Botan cryptographic library after its introduction. Botan developer Jack Lloyd removed the algorithm in 2010 after concluding the hash suffered from several weaknesses and had never become widely used.[13]

References

[edit]
  1. ^ Wang, Xiaoyun; Yin, Yiqun Lisa; Yu, Hongbo (2005). "Finding Collisions in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN 978-3-540-31870-5.(subscription required)
  • ^ Schneier, Bruce (15 February 2005). "SHA-1 Broken". Schneier on Security.
  • ^ Chen, Lily (25 April 2006). "NIST Comments on cryptanalytic attacks on SHA-1". NIST Computer Security Division.
  • ^ Chang, Shu-jen; Dworkin, Morris (2005). "Workshop Report: The First Cryptographic Hash Workshop" (PDF). Information Technology Laboratory, National Institute of Standards and Technology. {{cite journal}}: Cite journal requires |journal= (help)
  • ^ "SHA-3 Competition (2007–2012)". National Institute of Standards and Technology, Computer Security Division. 31 March 2014.
  • ^ Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek (2006). "A New Dedicated 256-Bit Hash Function: FORK-256". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 4047. pp. 195–209. doi:10.1007/11799313_13. ISBN 978-3-540-36598-3.
  • ^ a b Saarinen, Markku-Juhani (2007). "A Meet-in-the-Middle Collision Attack Against the New FORK-256". Progress in Cryptology – INDOCRYPT 2007. Lecture Notes in Computer Science. Vol. 4859. Springer Berlin Heidelberg. pp. 10–17. CiteSeerX 10.1.1.62.5191. doi:10.1007/978-3-540-77026-8_2. ISBN 978-3-540-77026-8.(subscription required)
  • ^ Matusiewicz, Krystian; Contini, Scott; Pieprzyk, Josef (2006). "Weaknesses of the FORK-256 compression function". IACR ePrint Archive.
  • ^ Mendel, Florian; Lano, Joseph; Preneel, Bart (2006). "Cryptanalysis of Reduced Variants of the FORK-256 Hash Function". Topics in Cryptology – CT-RSA 2007. Lecture Notes in Computer Science. Vol. 4377. Springer Berlin Heidelberg. pp. 85–100. doi:10.1007/11967668_6. ISBN 978-3-540-69328-4.(subscription required)
  • ^ Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef (2007). "Cryptanalysis of FORK-256". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 4593. pp. 19–38. doi:10.1007/978-3-540-74619-5_2. ISBN 978-3-540-74619-5.(subscription required)
  • ^ Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef (2007). "Extending FORK-256 Attack to the Full Hash Function". Information and Communications Security. Lecture Notes in Computer Science. Vol. 4861. Springer Berlin Heidelberg. pp. 296–305. doi:10.1007/978-3-540-77048-0_23. ISBN 978-3-540-77048-0. S2CID 15215802.
  • ^ Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jesang; Moon, Dukjae; Chee, Sungtaek (2007). "New FORK-256" (PDF). IACR ePrint Archive.
  • ^ Lloyd, Jack (25 May 2010), Removing FORK-256, Botan-devel mailing list

  • t
  • e

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=FORK-256&oldid=1163851204"

    Categories: 
    Cryptographic hash functions
    Cryptography stubs
    Hidden categories: 
    Pages containing links to subscription-only content
    CS1 errors: missing periodical
    Articles with short description
    Short description matches Wikidata
    Orphaned articles from October 2016
    All orphaned articles
    All articles with unsourced statements
    Articles with unsourced statements from August 2014
    All stub articles
     



    This page was last edited on 6 July 2023, at 19:08 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki