Pierre Karpman
Nanyang Technological University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pierre Karpman.
international cryptology conference | 2016
Marc Stevens; Pierre Karpman; Thomas Peyrin
This article presents an explicit freestart colliding pair for SHA-1, i.e. a collision for its internal compression function. This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps. Only 10i¾?days of computation on a 64-GPU cluster were necessary to perform this attack, for a runtime cost equivalent to approximately
international cryptology conference | 2017
Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov
Journal of Cryptology | 2018
Brice Minaud; Patrick Derbez; Pierre-Alain Fouque; Pierre Karpman
2^{57.5}
the cryptographers’ track at the rsa conference | 2014
Jian Guo; Pierre Karpman; Ivica Nikolić; Lei Wang; Shuang Wu
international cryptology conference | 2015
Pierre Karpman; Thomas Peyrin; Marc Stevens
257.5 calls to the compression function of SHA-1 on GPU. This work builds on a continuous series of cryptanalytic advancements on SHA-1 since the theoretical collision attack breakthrough of 2005. In particular, we reuse the recent work on 76-step SHA-1 of Karpman et al. from CRYPTO 2015 that introduced an efficient framework to implement freestart collisions on GPUs; we extend it by incorporating more sophisticated accelerating techniques such as boomerangs. We also rely on the results of Stevens from EUROCRYPT 2013 to obtain optimal attack conditions; using these techniques required further refinements for this work. Freestart collisions do not directly imply a collision for the full hash function. However, this work is an important milestone towards an actual SHA-1 collision and it further shows how GPUs can be used very efficiently for this kind of attack. Based on the state-of-the-art collision attack on SHA-1 by Stevens from EUROCRYPT 2013, we are able to present new projections on the computational and financial cost required for a SHA-1 collision computation. These projections are significantly lower than what was previously anticipated by the industry, due to the use of the more cost efficient GPUs compared to regular CPUs. We therefore recommend the industry, in particular Internet browser vendors and Certification Authorities, to retract SHA-1 quickly. We hope the industry has learned from the events surrounding the cryptanalytic breaks of MD5 and will retract SHA-1 before concrete attacks such as signature forgeries appear in the near future.
international conference on the theory and application of cryptology and information security | 2016
Pierre-Alain Fouque; Pierre Karpman; Paul Kirchner; Brice Minaud
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks.
international cryptology conference | 2015
Thomas Espitau; Pierre-Alain Fouque; Pierre Karpman
The
IACR Cryptology ePrint Archive | 2013
Pierre-Alain Fouque; Pierre Karpman
international conference on information security | 2015
Pierre Karpman
\mathsf {ASASA}
selected areas in cryptography | 2014
Daniel Augot; Pierre-Alain Fouque; Pierre Karpman