The eHash Main Page

From The ECRYPT Hash Function Website

(Difference between revisions)
Jump to: navigation, search
(References and bibtex)
 
(26 intermediate revisions not shown)
Line 1: Line 1:
-
== List of Hash Functions ==
+
= Introduction =
-
On this page you can find a collection of existing hash functions.
+
An [[Introduction to Hash Functions|introduction]] to cryptographic hash functions.
-
[http://mediawiki.iaik.tugraz.at/index.php/HashFunctions Collection of Cryptographic Hash Functions]
 
-
== Notation and Definition ==
+
= The Hash Function Zoo =
-
== Generic Attacks on Hash Functions ==
+
The [[The Hash Function Zoo|Hash Function Zoo]] is a collection of peer-reviewed hash functions.
-
== Some How Tos ==
+
The [[The SHA-3 Zoo|SHA-3 Zoo]] contains functions submitted to the [http://www.nist.gov/hash-competition NIST Hash Competition]. We also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates.
-
=== Working with maths and Tex ===
+
= Generic Attacks on Hash Functions =
-
We can write "normal" latex equation by using the ''math'' class. For instance the following code
 
-
<blockquote style="background: white; border: 1px solid black; padding: 1em;"><pre><nowiki>
+
[[Generic_Attacks| Generic Attacks on Hash Functions]].
-
<math>
+
-
{\textbf x}_{t} = {\textbf f}({x}_{t-1},{u}_{t-1},{p}_{t-1})
+
-
</math>
+
-
</nowiki></pre></blockquote>
+
-
is displayed as
+
[[GenericAttacksMerkleDamgaard| Generic Attacks on the Merkle-Damgaard Construction]].
-
<math>
 
-
{\textbf x}_{t} = {\textbf f}({x}_{t-1},{u}_{t-1},{p}_{t-1})
 
-
</math>
 
-
In order to use tex commands from the amsmath package we use the class ''amsmath''.
+
= Editors corner =
-
Automated numbering of equations works within a single ''amsmath'' environment.
+
-
The class amsmath uses the tex template defined in
+
-
/var/www/html/mediawiki/extensions/wikitex/wikitex.math.inc.tex
+
-
I changed the template such that we can define global commands. The template looks like
+
[[HowTo | How to]] work with math environments and BibTeX.
-
<blockquote style="background: white; border: 1px solid black; padding: 1em;"><pre><nowiki>
+
Mediawiki [http://www.mediawiki.org/wiki/Category:Help  help], [http://www.mediawiki.org/wiki/Help:FAQ FAQ], and release [http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce mailing list].
-
\documentclass[10pt]{article}
+
-
\usepackage{amssymb,amsmath,amscd,concmath}
+
-
% we can define whatever comments we would like to use for consistency.
+
-
% of course we have to somewhere list this special commands (may be we can use
+
-
% a pop up with editiing help or somkething similar
+
-
% for instance:
+
-
\newcommand{\rs}{\ensuremath{\gg}} %right shift >>
+
-
\newcommand{\ls}{\ensuremath{\ll}} %left shift <<
+
-
\newcommand{\rr}{\ensuremath{\ggg}}  %right rotate >>>
+
-
\newcommand{\lr}{\ensuremath{\lll}}  %left rotate <<<
+
-
\pagestyle{empty}
+
-
\begin{document}
+
-
%value%
+
-
\end{document}
+
-
</nowiki></pre></blockquote>
+
-
 
+
-
For instance:
+
-
 
+
-
{| align="center" border="1" cellpadding="10" cellspacing="0"
+
-
|-
+
-
!code fragment
+
-
!displayed equation
+
-
|-
+
-
|
+
-
<pre><nowiki>
+
-
<amsmath>
+
-
\begin{equation}
+
-
a = \sum_{i=0}^{n}{2^i}
+
-
\end{equation}
+
-
</amsmath>
+
-
</nowiki></pre>
+
-
|
+
-
<amsmath>
+
-
\begin{equation}
+
-
a = \sum_{i=0}^{n}{2^i}
+
-
\end{equation}
+
-
</amsmath>
+
-
|-
+
-
! colspan="2" style="background:#ffdead;" | %value% in tex-template is  \begin{equation}...\end{equation}
+
-
|}
+
-
 
+
-
 
+
-
 
+
-
If we start a new ''amsmath'' environment then the equation numbering starts from counter=1 again. Start a new ''amsmath'' environment:
+
-
 
+
-
<amsmath>
+
-
\begin{equation}
+
-
b = \sum_{i=0}^{n}{2^i}
+
-
\end{equation}
+
-
\begin{equation}
+
-
a = \sum_{i=0}^{n}{2^i}
+
-
\end{equation}
+
-
\begin{eqnarray}
+
-
a &\lr& b\\
+
-
c &\rr& d\\
+
-
e &\ls& f\\
+
-
g &\rs& h
+
-
\end{eqnarray}
+
-
</amsmath>
+
-
 
+
-
as we see both envrionments start with 1.
+
-
 
+
-
'''Note: to refer to an equation we will have to use a wiki link ...'''
+
-
 
+
-
If we use math inline then we have the following possibilities:
+
-
 
+
-
* Best know attack: 2<sup>63</sup> by Wang et.al. using html: <pre><nowiki>2<sup>63</sup></nowiki></pre>
+
-
* Best know attack: <amsmath>\begin{displaymath}2^{63}\end{displaymath}</amsmath> by Wang et.al. using amsmath <pre><nowiki><amsmath>\begin{displaymath}2^{63}\end{displaymath}</amsmath></nowiki></pre>
+
-
* Best know attack: <math>2^{63}</math> by Wang et.al. using math <pre><nowiki><math>2^{63}</math></nowiki></pre>
+
-
 
+
-
 
+
-
I think the first case looks best regarding the inline alignment. So I would suggest to use html for powers.
+
-
 
+
-
=== References and bibtex ===
+
-
 
+
-
<blockquote style="background: white; border: 1px solid black; padding: 1em;"><pre><nowiki>
+
-
<bibtex>
+
-
@MISC{HATTORI2004Complexityofthe,
+
-
  author = {Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA},
+
-
  title = {Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules},
+
-
  howpublished = {Cryptology ePrint Archive, Report 2004/325},
+
-
  year = {2004},
+
-
  note = {\url{http://eprint.iacr.org/}},
+
-
  url = {http://eprint.iacr.org/},
+
-
  pdf = {Q:\pdf\Hattori2004ComplexityOfThe.pdf},
+
-
}
+
-
</bibtex>
+
-
</nowiki></pre></blockquote>
+
-
 
+
-
will be displayed as:
+
-
 
+
-
<bibtex>
+
-
@MISC{HATTORI2004Complexityofthe,
+
-
  author = {Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA},
+
-
  title = {Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules},
+
-
  howpublished = {Cryptology ePrint Archive, Report 2004/325},
+
-
  year = {2004},
+
-
  note = {\url{http://eprint.iacr.org/}},
+
-
  url = {http://eprint.iacr.org/},
+
-
  pdf = {Q:\pdf\Hattori2004ComplexityOfThe.pdf},
+
-
}
+
-
</bibtex>
+
-
 
+
-
----
+
-
 
+
-
<blockquote style="background: white; border: 1px solid black; padding: 1em;"><pre><nowiki>
+
-
<bibtex>
+
-
@INPROCEEDINGS{2,
+
-
  author = {Daewan Han and Sangwoo Park and Seongtaek Chee},
+
-
  title = {Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98.},
+
-
  booktitle = {Fast Software Encryption 2002},
+
-
  year = {2002},
+
-
  series = {LNCS},
+
-
  pages = {252-262},
+
-
  volume = {2365},
+
-
  publisher = {Springer},
+
-
  editor = {Joan Daemen and Vincent Rijmen},
+
-
  pdf = {/test.pdf},
+
-
  abstract = {This is the abstract of this paper}
+
-
}
+
-
</bibtex>
+
-
</nowiki></pre></blockquote>
+
-
 
+
-
will be displayed as:
+
-
 
+
-
<bibtex>
+
-
@INPROCEEDINGS{2,
+
-
  author = {Daewan Han and Sangwoo Park and Seongtaek Chee},
+
-
  title = {Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98.},
+
-
  booktitle = {Fast Software Encryption 2002},
+
-
  year = {2002},
+
-
  series = {LNCS},
+
-
  pages = {252-262},
+
-
  volume = {2365},
+
-
  publisher = {Springer},
+
-
  editor = {Joan Daemen and Vincent Rijmen},
+
-
  pdf = {/test.pdf},
+
-
  abstract = {This is the abstract of this paper}
+
-
}
+
-
</bibtex>
+
-
 
+
-
 
+
-
----
+
-
 
+
-
 
+
-
<blockquote style="background: white; border: 1px solid black; padding: 1em;"><pre><nowiki>
+
-
<bibtex>
+
-
@ARTICLE{3,
+
-
  author = {Hans Dobbertin},
+
-
  title = {{Cryptanalysis Of MD4}},
+
-
  journal = {Journal of Cryptology},
+
-
  year = {1998},
+
-
  volume = {11},
+
-
  number = {4},
+
-
  pages = {253--271},
+
-
  pdf = {Q:\pdf\Dobbertin1997CryptanalysisOfMD4.pdf},
+
-
}
+
-
</bibtex>
+
-
</nowiki></pre></blockquote>
+
-
 
+
-
will be displayed as:
+
-
 
+
-
<bibtex>
+
-
@ARTICLE{3,
+
-
  author = {Hans Dobbertin},
+
-
  title = {{Cryptanalysis Of MD4}},
+
-
  journal = {Journal of Cryptology},
+
-
  year = {1998},
+
-
  volume = {11},
+
-
  number = {4},
+
-
  pages = {253--271},
+
-
  pdf = {Q:\pdf\Dobbertin1997CryptanalysisOfMD4.pdf},
+
-
}
+
-
</bibtex>
+
-
 
+
-
----
+
-
 
+
-
<blockquote style="background: white; border: 1px solid black; padding: 1em;"><pre><nowiki>
+
-
<bibtex>
+
-
@BOOK{4,
+
-
  title = {{Handbook of Applied Cryptography}},
+
-
  publisher = {CRC Press},
+
-
  year = {1997},
+
-
  author = {Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone},
+
-
  note = {Available online at \url{http://www.cacr.math.uwaterloo.ca/hac/}},
+
-
}
+
-
</bibtex>
+
-
</nowiki></pre></blockquote>
+
-
 
+
-
will be displayed as:
+
-
 
+
-
<bibtex>
+
-
@BOOK{4,
+
-
  title = {{Handbook of Applied Cryptography}},
+
-
  publisher = {CRC Press},
+
-
  year = {1997},
+
-
  author = {Alfred J. Menezes and Paul C. van Oorschot and Scott A. Vanstone},
+
-
  note = {Available online at \url{http://www.cacr.math.uwaterloo.ca/hac/}},
+
-
}
+
-
</bibtex>
+
-
 
+
-
----
+
-
 
+
-
=== About different skins ===
+
-
Every user can define his own skin. Nevertheless, it turnes out the the skin influences the alignment of inline amsmath environments. If we use the standard skin, namely MonoBook (default) then the alignment is pretty ok.
+
-
 
+
-
therefore, I suggest to keep this skin as default.
+
-
 
+
-
 
+
-
[http://mediawiki.iaik.tugraz.at/index.php/Testpage1 Testpage1]
+
-
 
+
-
== Getting started ==
+
-
 
+
-
* [http://www.mediawiki.org/wiki/Help:FAQ MediaWiki FAQ]
+
-
* [http://mail.wikipedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list]
+

Current revision as of 07:51, 12 March 2010

Contents

1 Introduction

An introduction to cryptographic hash functions.


2 The Hash Function Zoo

The Hash Function Zoo is a collection of peer-reviewed hash functions.

The SHA-3 Zoo contains functions submitted to the NIST Hash Competition. We also collect hardware implementation results of the candidates.

3 Generic Attacks on Hash Functions

Generic Attacks on Hash Functions.

Generic Attacks on the Merkle-Damgaard Construction.


4 Editors corner

How to work with math environments and BibTeX.

Mediawiki help, FAQ, and release mailing list.



ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.


Personal tools