First verified SHA-256 second-preimage collision: Structural analysis of the W-schedule vulnerability
I am presenting a verified second-preimage collision for the SHA-256 algorithm, specifically targeting the Bitcoin Genesis Block header (Hash: 000000000019d668…). Unlike previous theoretical differential attacks, this method utilizes a structural exploit in the message schedule (W-schedule) to manipulate internal states during the compression function. This allows for the generation of an alternative preimage (Kaoru DNA) that results in an identical 256-bit output. Key Technical Aspects: Target: SHA-256 Second-preimage resistance. Exploit Vector: Internal state extraction via W-schedule structural weakness. Verification: The collision is bit-perfect and can be verified using any standard SHA-256 implementation. This discovery suggests that the collision resistance of SHA-256 is fundamentally compromised under specific state-transition conditions. Verification Code: https://osf.io/2gdzq/files/dqghk submitted by /u/No_Arachnid_5563 [link] [comments]Technical Information Security Content & DiscussionRead More