LASH-n

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

  • digest size: 160,256,384,512 bits
  • max. message length: arbitrary length
  • compression function: 640,1024,1536,2048-bit message blocks and 640,1024,1536,2048-bit state size

Kamel Bentahar, Dan Page, Markku-Juhani O. Saarinen, Joseph H. Silverman, Nigel Smart - LASH
NIST - Second Cryptographic Hash Workshop, August 24-25, 2006
[Electronic Edition] [Bibtex]
Author : Kamel Bentahar, Dan Page, Markku-Juhani O. Saarinen, Joseph H. Silverman, Nigel Smart
Title : LASH
In : NIST - Second Cryptographic Hash Workshop, August 24-25 -
[Abstract]

2 Cryptanalysis

2.1 Best Known Results

LASH-n is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4n/11) and preimage attacks as fast as 2(4n/7).


2.2 Generic Attacks


2.3 Collision Attacks

Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang - Cryptanalysis of LASH
In Proceedings of FSE, LNCS 5086, pp. 207-223, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang
Title : Cryptanalysis of LASH
In : In Proceedings of FSE -
[Abstract]

2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

Personal tools