Difference between revisions of "Blender"

From The ECRYPT Hash Function Website
(Newbold's attack on Blender added)
(Cryptanalysis)
Line 20: Line 20:
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==
 +
 +
<bibtex>
 +
@misc{blenderN08,
 +
  author    = {Craig Newbold},
 +
  title    = {Observations and Attacks On The SHA-3 Candidate Blender },
 +
  howpublished = {Available online},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf},
 +
  year      = {2008},
 +
  abstract = {51 candidates have been accepted as first round candidates in NIST‘s
 +
SHA-3 competition, to decide the new cryptographic hash standard. Many
 +
of these submissions have no external cryptanalysis published, so the task
 +
begins to analyse their security and eliminate those that have vulnerabili-
 +
ties. In what we believe to be the first published external cryptananalysis
 +
of one candidate, Blender, we make observations on its structure, then
 +
exploit these features to give a multicollision attack of time complex-
 +
ity around $2^{\frac{n+w}2}$ , and a first preimage attack of time complexity around
 +
$n2^{\frac{n+w}2}$. Both attacks have minimal space requirements, so we believe that
 +
this constitutes a break of Blender. We then leave possible improvements
 +
on these attacks as open problems.},
 +
}
 +
</bibtex>
  
 
<bibtex>
 
<bibtex>
Line 51: Line 72:
 
   author    = {Liangyu Xu},
 
   author    = {Liangyu Xu},
 
   title    = {Semi-free start collision attack on Blender},
 
   title    = {Semi-free start collision attack on Blender},
  howpublished = {Reported online},
 
  year      = {2008},
 
}
 
</bibtex>
 
 
 
<bibtex>
 
@misc{blenderN08,
 
  author    = {Craig Newbold},
 
  title    = {Observations and Attacks On The SHA-3 Candidate Blender },
 
 
   howpublished = {Available online},
 
   howpublished = {Available online},
   url = {http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf},
+
   url       = {http://eprint.iacr.org/2008/532.pdf},
 
   year      = {2008},
 
   year      = {2008},
   abstract = {51 candidates have been accepted as first round candidates in NIST‘s
+
   abstract = {Blender is a cryptographic hash function submitted to NIST’s SHA3 competition. We
SHA-3 competition, to decide the new cryptographic hash standard. Many
+
have found a semi-free start collision attack on Blender with trivial complexity. One pair of  
of these submissions have no external cryptanalysis published, so the task
+
semi-free start collision messages with zero initial values is presented.},
begins to analyse their security and eliminate those that have vulnerabili-
 
ties. In what we believe to be the first published external cryptananalysis
 
of one candidate, Blender, we make observations on its structure, then
 
exploit these features to give a multicollision attack of time complex-  
 
ity around $2^{\frac{n+w}2}$ , and a first preimage attack of time complexity around
 
$n2^{\frac{n+w}2}$. Both attacks have minimal space requirements, so we believe that
 
this constitutes a break of Blender. We then leave possible improvements
 
on these attacks as open problems.},
 
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 11:26, 22 December 2008