Difference between revisions of "Abacus"
From The ECRYPT Hash Function Website
m (→Cryptanalysis) |
Mschlaeffer (talk | contribs) m |
||
Line 21: | Line 21: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
+ | |||
+ | {| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | ||
+ | |- style="background:#efefef;" | ||
+ | | Hash Function Name || Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | | Abacus || style="background:orange" | 2nd preimage || hash || || || 2<sup>344</sup> || - || [http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf Wilson] | ||
+ | |- | ||
+ | | Abacus || style="background:orange" | collision || hash || || || 2<sup>172</sup> || - || [http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf Wilson] | ||
+ | |- | ||
+ | | Abacus || style="background:orange" | 2nd preimage || hash || || || 2<sup>172</sup> || - || [http://lj.streamclub.ru/papers/hash/abacus.pdf Nikolić,Khovratovich] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
Revision as of 21:14, 29 December 2008
1 The algorithm
- Author(s): Neil Sholer
- NIST submission package: Abacus.zip
Neil Sholer - Abacus: A Candidate for SHA-3
- ,2008
- http://ehash.iaik.tugraz.at/uploads/b/be/Abacus.pdf
BibtexAuthor : Neil Sholer
Title : Abacus: A Candidate for SHA-3
In : -
Address :
Date : 2008
2 Cryptanalysis
Hash Function Name | Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
Abacus | 2nd preimage | hash | 2344 | - | Wilson | ||
Abacus | collision | hash | 2172 | - | Wilson | ||
Abacus | 2nd preimage | hash | 2172 | - | Nikolić,Khovratovich |
A description of this table is given here.
David A. Wilson - Abacus: A second-preimage and collision attack
- ,2008
- http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf
BibtexAuthor : David A. Wilson
Title : Abacus: A second-preimage and collision attack
In : -
Address :
Date : 2008
Ivica Nikolic, Dmitry Khovratovich - Second preimage attack on Abacus