Difference between revisions of "Blender"
From The ECRYPT Hash Function Website
Mlamberger (talk | contribs) m (→Cryptanalysis) |
(Newbold's attack on Blender added) |
||
Line 34: | Line 34: | ||
} | } | ||
</bibtex> | </bibtex> | ||
+ | |||
<bibtex> | <bibtex> | ||
Line 44: | Line 45: | ||
} | } | ||
</bibtex> | </bibtex> | ||
+ | |||
<bibtex> | <bibtex> | ||
Line 51: | Line 53: | ||
howpublished = {Reported online}, | howpublished = {Reported online}, | ||
year = {2008}, | year = {2008}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{blenderN08, | ||
+ | author = {Craig Newbold}, | ||
+ | title = {Observations and Attacks On The SHA-3 Candidate Blender }, | ||
+ | howpublished = {Available online}, | ||
+ | url = {http://ehash.iaik.tugraz.at/uploads/2/20/Observations_on_Blender.pdf}, | ||
+ | year = {2008}, | ||
+ | abstract = {51 candidates have been accepted as first round candidates in NIST‘s | ||
+ | SHA-3 competition, to decide the new cryptographic hash standard. Many | ||
+ | of these submissions have no external cryptanalysis published, so the task | ||
+ | begins to analyse their security and eliminate those that have vulnerabili- | ||
+ | ties. In what we believe to be the first published external cryptananalysis | ||
+ | of one candidate, Blender, we make observations on its structure, then | ||
+ | exploit these features to give a multicollision attack of time complex- | ||
+ | ity around $2^{\frac{n+w}2}$ , and a first preimage attack of time complexity around | ||
+ | $n2^{\frac{n+w}2}$. Both attacks have minimal space requirements, so we believe that | ||
+ | this constitutes a break of Blender. We then leave possible improvements | ||
+ | on these attacks as open problems.}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 21:36, 20 December 2008
1 The algorithm
- Author(s): Colin Bradbury
- NIST submission package: Blender.zip
Colin Bradbury - BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/5e/Blender.pdf
BibtexAuthor : Colin Bradbury
Title : BLENDER: A Proposed New Family of Cryptographic Hash Algorithms
In : -
Address :
Date : 2008
2 Cryptanalysis
Florian Mendel - Preimage Attack on Blender
- ,2008
- http://ehash.iaik.tugraz.at/uploads/4/48/Blender-preimage.pdf
BibtexAuthor : Florian Mendel
Title : Preimage Attack on Blender
In : -
Address :
Date : 2008
Vlastimil Klima - A near-collision attack on Blender-256
- ,2008
- http://cryptography.hyperlink.cz/BMW/near_collision_blender.pdf
BibtexAuthor : Vlastimil Klima
Title : A near-collision attack on Blender-256
In : -
Address :
Date : 2008
Liangyu Xu - Semi-free start collision attack on Blender
Craig Newbold - Observations and Attacks On The SHA-3 Candidate Blender