Cheetah

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Dmitry Khovratovich, Alex Biryukov, Ivica Nikolić - The Hash Function Cheetah: Specification and Supporting Documentation
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Dmitry Khovratovich, Alex Biryukov, Ivica Nikolić
Title : The Hash Function Cheetah: Specification and Supporting Documentation
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
length-extension hash all - - Gligoroski
semi-free-start collision compression 256 12 rounds 224 - Wu

A description of this table is given here.


Danilo Gligoroski - Cheetah hash function is not resistant against length-extension attack
OFFICIAL COMMENT (local link), 2008
[Electronic Edition] [Bibtex]
Author : Danilo Gligoroski
Title : Cheetah hash function is not resistant against length-extension attack
In : OFFICIAL COMMENT (local link) -

Shuang Wu - Semi-free Start Collision for 12-round Cheetah-256
NIST mailing list (local link), 2009
[Electronic Edition] [Bibtex]
Author : Shuang Wu
Title : Semi-free Start Collision for 12-round Cheetah-256
In : NIST mailing list (local link) -
Personal tools