Difference between revisions of "ARIRANG"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m |
m |
||
(6 intermediate revisions by 3 users not shown) | |||
Line 10: | Line 10: | ||
<bibtex> | <bibtex> | ||
@misc{sha3ChangHKK+08, | @misc{sha3ChangHKK+08, | ||
− | author = {Donghoon Chang | + | author = {Donghoon Chang and Seokhie Hong and Changheon Kang and Jinkeon Kang and Jongsung Kim and Changhoon Lee and Jesang Lee and Jongtae Lee and Sangjin Lee and Yuseop Lee and Jongin Lim and Jaechul Sung}, |
title = {ARIRANG}, | title = {ARIRANG}, | ||
url = {http://ehash.iaik.tugraz.at/uploads/2/2c/Arirang.pdf}, | url = {http://ehash.iaik.tugraz.at/uploads/2/2c/Arirang.pdf}, | ||
Line 17: | Line 17: | ||
} | } | ||
</bibtex> | </bibtex> | ||
+ | |||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | |
+ | |- style="background:#efefef;" | ||
+ | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | | | collision|| reduced compression || 256/512 || 26 steps || example, 1 || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
+ | |- | ||
+ | | | near-collision|| compression || 256/512 || full || example, 1 || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
+ | |- | ||
+ | | | pseudo-collision|| hash|| 224|| full || example, 2<sup>23</sup> || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
+ | |- | ||
+ | | | pseudo-collision|| hash|| 384|| full || example, 1 || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
+ | |- | ||
+ | | | preimage || reduced hash|| 256 || 33 steps || 2<sup>241</sup> || ? || [http://eprint.iacr.org/2009/147.pdf Hong, Kim, Koo] | ||
+ | |- | ||
+ | | | preimage || reduced hash|| 512 || 33 steps || 2<sup>481</sup> || ? || [http://eprint.iacr.org/2009/147.pdf Hong, Kim, Koo] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{ArirangGMKLW09, | ||
+ | author = {Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, and | ||
+ | Huaxiong Wang}, | ||
+ | title = {Practical pseudo-collisions for hash functions | ||
+ | ARIRANG-224/384}, | ||
+ | url = {http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf }, | ||
+ | howpublished = {Available online}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{cryptoeprint:2009:147, | ||
+ | author = {Deukjo Hong and Woo-Hwan Kim and Bonwook Koo}, | ||
+ | title = {Preimage Attack on ARIRANG}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2009/147}, | ||
+ | year = {2009}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | url = {http://eprint.iacr.org/2009/147.pdf}, | ||
+ | abstract ={The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with step-reduced compression functions. We consider two step-reduced variants of the compression function. First one uses the same feedforward$_1$ as the original algorithm, and the other one has the feedforward$_1$ working at the output of the half steps. Our attack finds a preimage of the 33-step OFF(Original FeedForward$_1$)-variants of ARIRANG-256 and ARIRANG-512 from Step 1 to Step 33, and a preimage of the 31-step MFF(Middle FeedForward$_1$)-variants of ARIRANG-256 and ARIRANG-512 from Step 3 to Step 33.}, | ||
+ | } | ||
+ | </bibtex> |
Latest revision as of 15:24, 14 April 2009
1 The algorithm
- Author(s): Donghoon Chang, Seokhie Hong, Changheon Kang, Jinkeon Kang, Jongsung Kim, Changhoon Lee, Jesang Lee, Jongtae Lee, Sangjin Lee, Yuseop Lee, Jongin Lim, Jaechul Sung
- NIST submission package: ARIRANG.zip
Donghoon Chang, Seokhie Hong, Changheon Kang, Jinkeon Kang, Jongsung Kim, Changhoon Lee, Jesang Lee, Jongtae Lee, Sangjin Lee, Yuseop Lee, Jongin Lim, Jaechul Sung - ARIRANG
- ,2008
- http://ehash.iaik.tugraz.at/uploads/2/2c/Arirang.pdf
BibtexAuthor : Donghoon Chang, Seokhie Hong, Changheon Kang, Jinkeon Kang, Jongsung Kim, Changhoon Lee, Jesang Lee, Jongtae Lee, Sangjin Lee, Yuseop Lee, Jongin Lim, Jaechul Sung
Title : ARIRANG
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
collision | reduced compression | 256/512 | 26 steps | example, 1 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
near-collision | compression | 256/512 | full | example, 1 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
pseudo-collision | hash | 224 | full | example, 223 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
pseudo-collision | hash | 384 | full | example, 1 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
preimage | reduced hash | 256 | 33 steps | 2241 | ? | Hong, Kim, Koo |
preimage | reduced hash | 512 | 33 steps | 2481 | ? | Hong, Kim, Koo |
A description of this table is given here.
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling,, Huaxiong Wang - Practical pseudo-collisions for hash functions
ARIRANG-224/384
- ,2009
- http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf
BibtexAuthor : Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling,, Huaxiong Wang
Title : Practical pseudo-collisions for hash functions ARIRANG-224/384
In : -
Address :
Date : 2009
Deukjo Hong, Woo-Hwan Kim, Bonwook Koo - Preimage Attack on ARIRANG