SHA-256 Cryptanalysis and Signal Processing Demonstrator

This tool explores SHA-256’s security through naive collision attempts, zero-fields, fixed points, and a signal processing analogy where collisions are aliasing events.


Core Engine Verification

Click to verify the SHA-256 implementation against the standard "abc" test vector.


Free-Start Collision and Analysis

Understanding SHA-256 as a Signal Processor

SHA-256’s compression function (H = IV + Permutation(IV, M)) can be viewed as a signal processing system:

Naive Collision Attempt: Fails due to the avalanche effect, where small input changes cause large output differences, resisting aliasing.

Sliding Zero-Field: Forces a zero state for a range of rounds, like a “flat signal,” simplifying differential paths but requiring complex connections.

Fixed Points: Values stable under rotations (e.g., 0x00000000 for ROTR(X, 7)) act as “pure tones” but are disrupted by non-linear operations.

Key Lesson: SHA-256’s non-linear sampling and high diffusion make aliasing (collisions) infeasible, even with cryptanalytic gadgets.

Note: This tool teaches concepts, not actual attacks. Use M1 = "abc", M2 = "def". Zero-fields and fixed points require specific inputs.

Content by Research Identifier: 7B7545EB2B5B22A28204066BD292A0365D4989260318CDF4A7A0407C272E9AFB