Difference between revisions of "Blender"

From The ECRYPT Hash Function Website
m (Cryptanalysis)
(Newbold's attack on Blender added)
Line 34: Line 34:
 
}
 
}
 
</bibtex>
 
</bibtex>
 +
  
 
<bibtex>
 
<bibtex>
Line 44: Line 45:
 
}
 
}
 
</bibtex>
 
</bibtex>
 +
  
 
<bibtex>
 
<bibtex>
Line 51: Line 53:
 
   howpublished = {Reported online},
 
   howpublished = {Reported online},
 
   year      = {2008},
 
   year      = {2008},
 +
}
 +
</bibtex>
 +
 +
 +
<bibtex>
 +
@misc{blenderN08,
 +
  author    = {Craig Newbold},
 +
  title    = {Observations and Attacks On The SHA-3 Candidate Blender },
 +
  howpublished = {Available online},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf},
 +
  year      = {2008},
 +
  abstract = {51 candidates have been accepted as first round candidates in NIST‘s
 +
SHA-3 competition, to decide the new cryptographic hash standard. Many
 +
of these submissions have no external cryptanalysis published, so the task
 +
begins to analyse their security and eliminate those that have vulnerabili-
 +
ties. In what we believe to be the first published external cryptananalysis
 +
of one candidate, Blender, we make observations on its structure, then
 +
exploit these features to give a multicollision attack of time complex-
 +
ity around $2^{\frac{n+w}2}$ , and a first preimage attack of time complexity around
 +
$n2^{\frac{n+w}2}$. Both attacks have minimal space requirements, so we believe that
 +
this constitutes a break of Blender. We then leave possible improvements
 +
on these attacks as open problems.},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 21:36, 20 December 2008