Difference between revisions of "Blender"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m (→Cryptanalysis) |
Mschlaeffer (talk | contribs) m (→Cryptanalysis) |
||
Line 23: | Line 23: | ||
{| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | {| border="1" cellpadding="4" cellspacing="0" align="center" class="wikitable" style="text-align:center" | ||
|- style="background:#efefef;" | |- style="background:#efefef;" | ||
− | | | + | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference |
|- | |- | ||
− | + | | style="background:orange" | preimage || hash || all || || n*2<sup>n/2</sup> || - || [http://ehash.iaik.tugraz.at/uploads/4/48/Blender-preimage.pdf Mendel] | |
|- | |- | ||
− | + | | near-collision || hash || all || || example || - || [http://cryptography.hyperlink.cz/BMW/near_collision_blender.pdf Klima] | |
|- | |- | ||
− | + | | semi-free start collision || hash || all || || example || - || [http://eprint.iacr.org/2008/532.pdf Xu] | |
|- | |- | ||
− | + | | style="background:orange" | preimage || hash || all || || n*2<sup>(n+w)/2</sup> || - || [http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf Newbold] | |
|- | |- | ||
|} | |} | ||
Line 58: | Line 58: | ||
} | } | ||
</bibtex> | </bibtex> | ||
− | |||
<bibtex> | <bibtex> | ||
Line 73: | Line 72: | ||
} | } | ||
</bibtex> | </bibtex> | ||
− | |||
<bibtex> | <bibtex> | ||
Line 84: | Line 82: | ||
} | } | ||
</bibtex> | </bibtex> | ||
− | |||
<bibtex> | <bibtex> |
Revision as of 21:41, 29 December 2008
1 The algorithm
- Author(s): Colin Bradbury
- NIST submission package: Blender.zip
Colin Bradbury - BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/5e/Blender.pdf
BibtexAuthor : Colin Bradbury
Title : BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
preimage | hash | all | n*2n/2 | - | Mendel | |
near-collision | hash | all | example | - | Klima | |
semi-free start collision | hash | all | example | - | Xu | |
preimage | hash | all | n*2(n+w)/2 | - | Newbold |
A detailed description of this table is given here.
Craig Newbold - Observations and Attacks On The SHA-3 Candidate Blender
- ,2008
- http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf
BibtexAuthor : Craig Newbold
Title : Observations and Attacks On The SHA-3 Candidate Blender
In : -
Address :
Date : 2008
Florian Mendel - Preimage Attack on Blender
- ,2008
- http://ehash.iaik.tugraz.at/uploads/4/48/Blender-preimage.pdf
BibtexAuthor : Florian Mendel
Title : Preimage Attack on Blender
In : -
Address :
Date : 2008
Vlastimil Klima - A near-collision attack on Blender-256
- ,2008
- http://cryptography.hyperlink.cz/BMW/near_collision_blender.pdf
BibtexAuthor : Vlastimil Klima
Title : A near-collision attack on Blender-256
In : -
Address :
Date : 2008
Liangyu Xu - Semi-free start collision attack on Blender