Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pierre Karpman is active.

Publication


Featured researches published by Pierre Karpman.


international cryptology conference | 2016

Freestart Collision for Full SHA-1

Marc Stevens; Pierre Karpman; Thomas Peyrin

This article presents an explicit freestart colliding pair for SHA-1, i.e. a collision for its internal compression function. This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps. Only 10i¾?days of computation on a 64-GPU cluster were necessary to perform this attack, for a runtime cost equivalent to approximately


international cryptology conference | 2017

The First Collision for Full SHA-1

Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov


Journal of Cryptology | 2018

Key-Recovery Attacks on ASASA

Brice Minaud; Patrick Derbez; Pierre-Alain Fouque; Pierre Karpman

2^{57.5}


the cryptographers’ track at the rsa conference | 2014

Analysis of BLAKE2

Jian Guo; Pierre Karpman; Ivica Nikolić; Lei Wang; Shuang Wu


international cryptology conference | 2015

Practical free-start collision attacks on 76-step SHA-1

Pierre Karpman; Thomas Peyrin; Marc Stevens

257.5 calls to the compression function of SHA-1 on GPU. This work builds on a continuous series of cryptanalytic advancements on SHA-1 since the theoretical collision attack breakthrough of 2005. In particular, we reuse the recent work on 76-step SHA-1 of Karpman et al. from CRYPTO 2015 that introduced an efficient framework to implement freestart collisions on GPUs; we extend it by incorporating more sophisticated accelerating techniques such as boomerangs. We also rely on the results of Stevens from EUROCRYPT 2013 to obtain optimal attack conditions; using these techniques required further refinements for this work. Freestart collisions do not directly imply a collision for the full hash function. However, this work is an important milestone towards an actual SHA-1 collision and it further shows how GPUs can be used very efficiently for this kind of attack. Based on the state-of-the-art collision attack on SHA-1 by Stevens from EUROCRYPT 2013, we are able to present new projections on the computational and financial cost required for a SHA-1 collision computation. These projections are significantly lower than what was previously anticipated by the industry, due to the use of the more cost efficient GPUs compared to regular CPUs. We therefore recommend the industry, in particular Internet browser vendors and Certification Authorities, to retract SHA-1 quickly. We hope the industry has learned from the events surrounding the cryptanalytic breaks of MD5 and will retract SHA-1 before concrete attacks such as signature forgeries appear in the near future.


international conference on the theory and application of cryptology and information security | 2016

Efficient and Provable White-Box Primitives

Pierre-Alain Fouque; Pierre Karpman; Paul Kirchner; Brice Minaud

SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks.


international cryptology conference | 2015

Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE

Thomas Espitau; Pierre-Alain Fouque; Pierre Karpman

The


IACR Cryptology ePrint Archive | 2013

Security Amplification against Meet-in-the-Middle Attacks Using Whitening

Pierre-Alain Fouque; Pierre Karpman


international conference on information security | 2015

From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour

Pierre Karpman

\mathsf {ASASA}


selected areas in cryptography | 2014

Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation

Daniel Augot; Pierre-Alain Fouque; Pierre Karpman

Collaboration


Dive into the Pierre Karpman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ivica Nikolić

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Jian Guo

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Lei Wang

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Thomas Peyrin

Nanyang Technological University

View shared research outputs
Researchain Logo
Decentralizing Knowledge