{"id":379,"date":"2012-09-26T15:15:37","date_gmt":"2012-09-26T13:15:37","guid":{"rendered":"http:\/\/blog.nebule.org\/?p=379"},"modified":"2016-03-29T19:04:44","modified_gmt":"2016-03-29T17:04:44","slug":"sha256","status":"publish","type":"post","link":"http:\/\/blog.nebule.org\/?p=379","title":{"rendered":"SHA256?"},"content":{"rendered":"<p style=\"text-align: justify;\">Quelle est la solidit\u00e9 de l&rsquo;algorithme de hash SHA256?<\/p>\n<p style=\"text-align: justify;\">Le site <a title=\"http:\/\/www.ecrypt.eu.org\/\" href=\"http:\/\/www.ecrypt.eu.org\/\" target=\"_blank\">www.ecrypt.eu.org<\/a> (ECRYPT II) diffuse un document <a title=\"D.SPA.17.pdf\" href=\"http:\/\/www.ecrypt.eu.org\/documents\/D.SPA.17.pdf\" target=\"_blank\">D.SPA.17.pdf<\/a> (sans licence apparente) r\u00e9capitulant les propri\u00e9t\u00e9s d&rsquo;algorithmes cryptographiques et de pratiques. Ce document r\u00e9capitule les travaux sur ces algorithmes et m\u00e9thodes, et \u00e9value la solidit\u00e9 de ceux-ci.<\/p>\n<p style=\"text-align: justify;\">Le site <a title=\"http:\/\/www.keylength.com\/fr\/\" href=\"http:\/\/www.keylength.com\/fr\/\" target=\"_blank\">www.keylength.com<\/a> r\u00e9f\u00e9rence les recommandations de diff\u00e9rents organismes gouvernementaux et notamment <a title=\"http:\/\/www.keylength.com\/fr\/5\/\" href=\"http:\/\/www.keylength.com\/fr\/5\/\" target=\"_blank\">celles de l&rsquo;ANSSI<\/a>. Les recommandations de l&rsquo;<a title=\"http:\/\/www.ssi.gouv.fr\/\" href=\"http:\/\/www.ssi.gouv.fr\/\" target=\"_blank\">ANSSI<\/a> sont disponibles dans le document <a title=\"http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/RGS_B_1.pdf\" href=\"http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/RGS_B_1.pdf\" target=\"_blank\">RGS_B_1.pdf<\/a>.<\/p>\n<p style=\"text-align: justify;\">Conclusion, SHA256 est adapt\u00e9 \u00e0 l&rsquo;utilisation que l&rsquo;on en fait aujourd&rsquo;hui dans nebule.<\/p>\n<p><!--more--><\/p>\n<p>Extrait du document\u00c2\u00a0<a title=\"D.SPA.17.pdf\" href=\"http:\/\/www.ecrypt.eu.org\/documents\/D.SPA.17.pdf\" target=\"_blank\">D.SPA.17.pdf<\/a> concernant SHA256 :<\/p>\n<h2 style=\"padding-left: 30px;\">10.7 SHA-224, SHA-256<\/h2>\n<p style=\"padding-left: 30px; text-align: justify;\"><strong>De\u00ef\u00ac\u0081nition:<\/strong> NIST FIPS 180-2, [199] (Also part of Suite-B [218], ISO\/IES 10118-3).<br \/>\n<strong>Parameters:<\/strong> 224-bit and 256-bit hash outputs respectively, max input size 264 \u00e2\u02c6\u2019 1 bits.<br \/>\n<strong>Security:<\/strong> As claimed; collision search requires 2^112 and 2^128 iterations of the compression function respectively.<br \/>\n<strong>Deployment:<\/strong> Likely to become widespread.<br \/>\n<strong>Implementation:<\/strong><br \/>\n<strong>Public analysis:<\/strong> Cryptrec report [68]. See also [96, 112].<br \/>\n<strong>Known weakness:<\/strong><br \/>\n<strong>Comments:<\/strong> Collisions on SHA have been reported. While SHA has some similarities, it is also a signi\u00ef\u00ac\u0081cantly di\u00ef\u00ac\u20acerent design to SHA-224 and SHA-256. SHA-224 is identical to SHA-256, except that it uses a di\u00ef\u00ac\u20acerent IV and truncates the output. Simpli\u00ef\u00ac\u0081ed variants of SHA-256 have been analyzed in [180, 190, 289].<br \/>\nPractical collision attacks for up to 24 (out of 64) steps have been reported [122, 246]. Preimage attacks for SHA-256 reduced to 43 (out of 64) steps have also been reported [15, 105].<\/p>\n<p style=\"text-align: justify;\">Copie du document :<br \/>\n&#8211; <a href=\"http:\/\/blog.nebule.org\/?attachment_id=380\" rel=\"attachment wp-att-380\">D.SPA.17<\/a> (SHA256 : a1f20d3625c08cbd014f58af54c21dc335f65cd3b6a0f899b3129aa8dd8249dc)<br \/>\n-\u00c2\u00a0<a href=\"http:\/\/blog.nebule.org\/?attachment_id=384\" rel=\"attachment wp-att-384\">RGS_B_1<\/a> (SHA256 : bbebb1b9c21fa5c572e98c1af327db5799fed27d6b03d492462a5ce440a2196d)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quelle est la solidit\u00e9 de l&rsquo;algorithme de hash SHA256? Le site www.ecrypt.eu.org (ECRYPT II) diffuse un document D.SPA.17.pdf (sans licence apparente) r\u00e9capitulant les propri\u00e9t\u00e9s d&rsquo;algorithmes cryptographiques et de pratiques. Ce document r\u00e9capitule les travaux sur ces algorithmes et m\u00e9thodes, et \u00e9value la solidit\u00e9 de ceux-ci. Le site www.keylength.com r\u00e9f\u00e9rence les recommandations de diff\u00e9rents organismes gouvernementaux &hellip; <a href=\"http:\/\/blog.nebule.org\/?p=379\" class=\"more-link\">Continuer la lecture de <span class=\"screen-reader-text\">SHA256?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,4],"tags":[],"_links":{"self":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts\/379"}],"collection":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=379"}],"version-history":[{"count":1,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts\/379\/revisions"}],"predecessor-version":[{"id":2337,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=\/wp\/v2\/posts\/379\/revisions\/2337"}],"wp:attachment":[{"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=379"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.nebule.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}