Tiger

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

Ross J. Anderson, Eli Biham - TIGER: A Fast New Hash Function
In Proceedings of FSE, LNCS 1039, pp. 89-97, Springer, 1996
[Electronic Edition] [Bibtex]
Author : Ross J. Anderson, Eli Biham
Title : TIGER: A Fast New Hash Function
In : In Proceedings of FSE -
[Abstract]

2 Cryptanalysis

2.1 Best Known Results

The best known attack is a 1-bit circular pseudo-near-collision for Tiger with a complexity of about 247 of Mendel and Rijmen. The best collision attack on Tiger was presented by Mendel et al. for Tiger reduced to 19 out of 24 rounds. The attack has a complexity of about 262.


2.2 Generic Attacks


2.3 Collision Attacks

Florian Mendel, Vincent Rijmen - Cryptanalysis of the Tiger Hash Function
In Proceedings of ASIACRYPT, LNCS 4833, pp. 536-550, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Florian Mendel, Vincent Rijmen
Title : Cryptanalysis of the Tiger Hash Function
In : In Proceedings of ASIACRYPT -
[Abstract]

Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe - Update on Tiger
In Proceedings of INDOCRYPT, LNCS 4329, pp. 63-79, Springer, 2006
[Electronic Edition] [Bibtex]
Author : Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe
Title : Update on Tiger
In : In Proceedings of INDOCRYPT -
[Abstract]

John Kelsey, Stefan Lucks - Collisions and Near-Collisions for Reduced-Round Tiger
In Proceedings of FSE, LNCS 4047, pp. 111-125, Springer, 2006
[Electronic Edition] [Bibtex]
Author : John Kelsey, Stefan Lucks
Title : Collisions and Near-Collisions for Reduced-Round Tiger
In : In Proceedings of FSE -
[Abstract]

2.4 Second Preimage Attacks


2.5 Preimage Attacks

Takanori Isobe, Kyoji Shibutani - Preimage Attacks on Reduced Tiger and SHA-2
In Proceedings of Fast Software Encryption, LNCS 5665, pp. 139-155, Springer, 2009
[Electronic Edition] [Bibtex]
Author : Takanori Isobe, Kyoji Shibutani
Title : Preimage Attacks on Reduced Tiger and SHA-2
In : In Proceedings of Fast Software Encryption -
[Abstract]

Florian Mendel - Two Passes of Tiger Are Not One-Way
In Proceedings of AFRICACRYPT, LNCS 5580, pp. 29-40, Springer, 2009
[Electronic Edition] [Bibtex]
Author : Florian Mendel
Title : Two Passes of Tiger Are Not One-Way
In : In Proceedings of AFRICACRYPT -
[Abstract]

Sebastiaan Indesteege, Bart Preneel - Preimages for Reduced-Round Tiger
In Proceedings of WEWoRC, LNCS 4945, pp. 90-99, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Sebastiaan Indesteege, Bart Preneel
Title : Preimages for Reduced-Round Tiger
In : In Proceedings of WEWoRC -
[Abstract]

2.6 Others

Personal tools