Vortex

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

  • digest size: 256 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 256-bit chaining variable
  • Specification:

Shay Gueron, Michael E. Kounavis - Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
In Proceedings of ISC, LNCS 5222, pp. 331-340, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Shay Gueron, Michael E. Kounavis
Title : Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
In : In Proceedings of ISC -
[Abstract]

2 Cryptanalysis

2.1 Best Known Results

Collision attacks and distinguishing attacks were found.


2.2 Generic Attacks


2.3 Collision Attacks

A collision attack is described in

Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen - Cryptanalysis of Vortex
In Proceedings of AFRICACRYPT, LNCS 5580, pp. 14-28, Springer, 2009
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
Title : Cryptanalysis of Vortex
In : In Proceedings of AFRICACRYPT -
[Abstract]



2.4 Preimage Attacks


2.5 Others

A distinguisher is described in

Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen - Cryptanalysis of Vortex
In Proceedings of AFRICACRYPT, LNCS 5580, pp. 14-28, Springer, 2009
[Electronic Edition] [Bibtex]
Author : Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
Title : Cryptanalysis of Vortex
In : In Proceedings of AFRICACRYPT -
[Abstract]
Personal tools