JH

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 The algorithm


Hongjun Wu - The Hash Function JH
Submission to NIST (round 3), 2011
[Electronic Edition] [Bibtex]
Author : Hongjun Wu
Title : The Hash Function JH
In : Submission to NIST (round 3) -

Hongjun Wu - The Hash Function JH
Submission to NIST (Round 1/2), 2009
[Electronic Edition] [Bibtex]
Author : Hongjun Wu
Title : The Hash Function JH
In : Submission to NIST (Round 1/2) -

2 Cryptanalysis

We distinguish between two cases: results on the complete hash function, and results on underlying building blocks.

A description of the tables is given here.

Recommended security parameter: 42 rounds


2.1 Hash function

Here we list results on the hash function according to the NIST requirements. The only allowed modification is to change the security parameter.

Type of Analysis Hash Size (n) Parameters Compression Function Calls Memory Requirements Reference
preimage 512 2507 2507 Bhattacharyya et al.
preimage(1) 512 2510.3 (+ 2524 MA + 2524 CMP) 2510.3 (Wu: 2510.6) Mendel,Thomsen, Wu

(1) Wu has analyzed the exact memory requirements, additional memory accesses (MA) and comparisons (CMP) of the attack by Mendel and Thomsen.


2.2 Building blocks

Here we list results on underlying building blocks, and the hash function modified by other means than the security parameter.

Note that these results assume more direct control or access over some internal variables (aka. free-start, pseudo, compression function, block cipher, or permutation attacks).

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
semi-free-start collision compression function 256 26 rounds 2112 257.6 Naya-Plasencia,Toz,Varici
semi-free-start collision compression function 256 32 rounds 2304 257.6 Naya-Plasencia,Toz,Varici
semi-free-start collision compression function 256 36 rounds 2352 257.6 Naya-Plasencia,Toz,Varici
semi-free-start collision compression function 256 37 rounds 2352 257.6 Naya-Plasencia,Toz,Varici
distinguisher internal permutation 256 42 rounds 2304 257.6 Naya-Plasencia,Toz,Varici
distinguisher internal permutation 256 42 rounds 2352 257.6 Naya-Plasencia,Toz,Varici
semi-free-start collision compression function 256 16 rounds 296.12 296.12 Naya-Plasencia
semi-free-start near collision compression function 256 22 rounds 295.63 295.63 Naya-Plasencia
semi-free-start near collision compression function all 10 rounds 223.24 - Turan,Uyan
semi-free-start collision hash 256 16 rounds 2178.24 2101.12 Rijmen,Toz,Varıcı
semi-free-start near collision compression function 256 22 rounds 2156.77 2143.70 Rijmen,Toz,Varıcı
semi-free-start near collision compression function 256 22 rounds 2156.56 2143.70 Rijmen,Toz,Varıcı
pseudo-collision compression function all - - Bagheri
pseudo-2nd preimage compression all - - Bagheri


María Naya-Plasencia, Deniz Toz, Kerem Varici, Kerem Varici - Rebound Attack on JH42.
In Proceedings of ASIACRYPT, , pp. 252-269, 2011
[Electronic Edition] [Bibtex]
Author : María Naya-Plasencia, Deniz Toz, Kerem Varici, Kerem Varici
Title : Rebound Attack on JH42.
In : In Proceedings of ASIACRYPT -
[Abstract]

María Naya-Plasencia - Scrutinizing rebound attacks: new algorithms for improving the complexities
Cryptology ePrint Archive, Report 2010/607, 2010
[Electronic Edition] [Bibtex]
Author : María Naya-Plasencia
Title : Scrutinizing rebound attacks: new algorithms for improving the complexities
In : Cryptology ePrint Archive, Report 2010/607 -
[Abstract]

Meltem Sönmez Turan, Erdener Uyan - Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH
Second SHA-3 Candidate Conference, 2010
[Electronic Edition] [Bibtex]
Author : Meltem Sönmez Turan, Erdener Uyan
Title : Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH
In : Second SHA-3 Candidate Conference -
[Abstract]

Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi - Security Analysis of the Mode of JH Hash Function
In Proceedings of FSE, LNCS 6147, pp. 168-191, Springer, 2010
[Electronic Edition] [Bibtex]
Author : Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
Title : Security Analysis of the Mode of JH Hash Function
In : In Proceedings of FSE -

Vincent Rijmen, Denis Toz, Kerem Varıcı - Rebound Attack on Reduced-Round Versions of JH
In Proceedings of FSE, LNCS 6147, pp. 286-303, Springer, 2010
[Electronic Edition] [Bibtex]
Author : Vincent Rijmen, Denis Toz, Kerem Varıcı
Title : Rebound Attack on Reduced-Round Versions of JH
In : In Proceedings of FSE -

Nasour Bagheri - Pseudo-collision and pseudo-second preimage on JH
NIST mailing list, 2008
[Electronic Edition] [Bibtex]
Author : Nasour Bagheri
Title : Pseudo-collision and pseudo-second preimage on JH
In : NIST mailing list -

Florian Mendel, Søren S. Thomsen - An Observation on JH-512
Available online, 2008
[Electronic Edition] [Bibtex]
Author : Florian Mendel, Søren S. Thomsen
Title : An Observation on JH-512
In : Available online -
[Abstract]

Hongjun Wu - The Complexity of Mendel and Thomsen's Preimage Attack on JH-512
Available online, 2009
[Electronic Edition] [Bibtex]
Author : Hongjun Wu
Title : The Complexity of Mendel and Thomsen's Preimage Attack on JH-512
In : Available online -
[Abstract]
Personal tools