Dynamic SHA

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Zijie Xu - Dynamic SHA
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Zijie Xu
Title : Dynamic SHA
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
length-extension hash all - - Klima
collision hash 256 223 - Indesteege
collision hash 512 224 - Indesteege
2nd preimage hash 224,256 2216 - Aumasson,Dunkelman,Indesteege,Preneel
2nd preimage hash 384,512 2256 - Aumasson,Dunkelman,Indesteege,Preneel
preimage hash 224,256 2225 - Aumasson,Dunkelman,Indesteege,Preneel
preimage hash 224,256 2262 - Aumasson,Dunkelman,Indesteege,Preneel

A description of this table is given here.


Vlastimil Klima - Dynamic SHA is vulnerable to generic attacks
OFFICIAL COMMENT (local link), 2008
[Electronic Edition] [Bibtex]
Author : Vlastimil Klima
Title : Dynamic SHA is vulnerable to generic attacks
In : OFFICIAL COMMENT (local link) -

Sebastiaan Indesteege - Practical Collisions for Dynamic SHA
Available online, 2009
[Electronic Edition] [Bibtex]
Author : Sebastiaan Indesteege
Title : Practical Collisions for Dynamic SHA
In : Available online -

Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel - Cryptanalysis of Dynamic SHA(2)
Cryptology ePrint Archive, Report 2009/184, 2009
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
Title : Cryptanalysis of Dynamic SHA(2)
In : Cryptology ePrint Archive, Report 2009/184 -
[Abstract]


2.1 Archive

Sebastiaan Indesteege - Cryptanalysis of Dynamic SHA
FSE 2009 rump session, slides available online (local link), 2009
[Electronic Edition] [Bibtex]
Author : Sebastiaan Indesteege
Title : Cryptanalysis of Dynamic SHA
In : FSE 2009 rump session, slides available online (local link) -
Personal tools