Edon-R (SHA-3 submission)

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Danilo Gligoroski, Rune Steinsmo Ødegård, Marija Mihova, Svein Johan Knapskog, Ljupco Kocarev, Aleš Drápal, Vlastimil Klima - Cryptographic Hash Function EDON-R
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Danilo Gligoroski, Rune Steinsmo Ødegård, Marija Mihova, Svein Johan Knapskog, Ljupco Kocarev, Aleš Drápal, Vlastimil Klima
Title : Cryptographic Hash Function EDON-R
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
preimage(1) hash 22n/3 22n/3 Khovratovich,Nikolić,Weinmann
multi-collision (2K) hash 256,512 K*2n/2 2n/2 Klima
multi-preimage hash 256,512  ?  ? Klima
collision compression - - Khovratovich,Nikolić,Weinmann
2nd preimage compression - - Khovratovich,Nikolić,Weinmann
preimage compression - - Khovratovich,Nikolić,Weinmann
key recovery secret-prefix MAC 25n/8 - Leurent
correlation analysis hash all - - Novotney, Ferguson

A description of this table is given here.

(1) Gligoroski,Ødegård dispute the validity of the model in which the attack of Khovratovich et. al is compared to generic attacks.


Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann - Cryptanalysis of Edon-R
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
Title : Cryptanalysis of Edon-R
In : Available online -
[Abstract]

Vlastimil Klima - Multicollisions of EDON-R hash function and other observations
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Vlastimil Klima
Title : Multicollisions of EDON-R hash function and other observations
In : Available online -
[Abstract]

Danilo Gligoroski, Rune Steinsmo Ødegård - On the Complexity of Khovratovich et. al's Preimage Attack on EDON-R
Available online, 2009
[Electronic Edition] [Bibtex]
Author : Danilo Gligoroski, Rune Steinsmo Ødegård
Title : On the Complexity of Khovratovich et. al's Preimage Attack on EDON-R
In : Available online -
[Abstract]

Gaëtan Leurent - Key Recovery Attack against Secret-prefix Edon-R
Cryptology ePrint Archive, Report 2009/135, 2009
[Electronic Edition] [Bibtex]
Author : Gaëtan Leurent
Title : Key Recovery Attack against Secret-prefix Edon-R
In : Cryptology ePrint Archive, Report 2009/135 -
[Abstract]

Peter Novotney, Niels Ferguson - Detectable correlations in Edon-R
Cryptology ePrint Archive, Report 2009/378, 2009
[Electronic Edition] [Bibtex]
Author : Peter Novotney, Niels Ferguson
Title : Detectable correlations in Edon-R
In : Cryptology ePrint Archive, Report 2009/378 -
[Abstract]
Personal tools