Difference between revisions of "Blue Midnight Wish"
From The ECRYPT Hash Function Website
(Pseudo-cryptanalysis of Blue Midnight Wish) |
m (added link to round 2 submission) |
||
Line 2: | Line 2: | ||
* Author(s): Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Jørn Amundsen, Stig Frode Mjølsnes | * Author(s): Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Jørn Amundsen, Stig Frode Mjølsnes | ||
− | * Website: [http://www. | + | * Website: [http://www.q2s.ntnu.no/sha3_nist_competition/start http://www.q2s.ntnu.no/sha3_nist_competition/start] |
− | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Blue_Midnight_Wish.zip Blue_Midnight_Wish.zip] | + | * NIST submission package: |
+ | ** round 1: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Blue_Midnight_Wish.zip Blue_Midnight_Wish.zip] | ||
+ | ** round 2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Blue_Midnight_Wish_Round2.zip Blue_Midnight_Wish_Round2.zip] | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3GligoroskiKKH+09, | ||
+ | author = {Danilo Gligoroski and Vlastimil Klima and Svein Johan Knapskog and Mohamed El-Hadedy and J\o{}rn Amundsen and Stig Frode Mj\o{}lsnes}, | ||
+ | title = {Cryptographic Hash Function BLUE MIDNIGHT WISH}, | ||
+ | url = {http://people.item.ntnu.no/~danilog/Hash/BMW-SecondRound/Supporting_Documentation/BlueMidnightWishDocumentation.pdf}, | ||
+ | howpublished = {Submission to NIST (Round 2)}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3GligoroskiK09, | ||
+ | author = {Danilo Gligoroski and Vlastimil Klima }, | ||
+ | title = {A Document describing all modifications made on the Blue Midnight Wish cryptographic hash function before entering the Second Round of SHA-3 hash competition}, | ||
+ | url = {http://people.item.ntnu.no/~danilog/Hash/BMW-SecondRound/Supporting_Documentation/Round2Mods.pdf}, | ||
+ | howpublished = {Available online}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | </bibtex> | ||
<bibtex> | <bibtex> | ||
Line 11: | Line 33: | ||
title = {Cryptographic Hash Function BLUE MIDNIGHT WISH}, | title = {Cryptographic Hash Function BLUE MIDNIGHT WISH}, | ||
url = {http://people.item.ntnu.no/~danilog/Hash/BMW/Supporting_Documentation/BlueMidnightWishDocumentation.pdf}, | url = {http://people.item.ntnu.no/~danilog/Hash/BMW/Supporting_Documentation/BlueMidnightWishDocumentation.pdf}, | ||
− | howpublished = {Submission to NIST}, | + | howpublished = {Submission to NIST (Round 1)}, |
year = {2008}, | year = {2008}, | ||
} | } | ||
</bibtex> | </bibtex> | ||
− | |||
== Cryptanalysis == | == Cryptanalysis == |
Revision as of 16:30, 23 November 2009
1 The algorithm
- Author(s): Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Jørn Amundsen, Stig Frode Mjølsnes
- Website: http://www.q2s.ntnu.no/sha3_nist_competition/start
- NIST submission package:
- round 1: Blue_Midnight_Wish.zip
- round 2: Blue_Midnight_Wish_Round2.zip
Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, J\orn Amundsen, Stig Frode Mj\olsnes - Cryptographic Hash Function BLUE MIDNIGHT WISH
- ,2009
- http://people.item.ntnu.no/~danilog/Hash/BMW-SecondRound/Supporting_Documentation/BlueMidnightWishDocumentation.pdf
BibtexAuthor : Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, J\orn Amundsen, Stig Frode Mj\olsnes
Title : Cryptographic Hash Function BLUE MIDNIGHT WISH
In : -
Address :
Date : 2009
Danilo Gligoroski, Vlastimil Klima - A Document describing all modifications made on the Blue Midnight Wish cryptographic hash function before entering the Second Round of SHA-3 hash competition
- ,2009
- http://people.item.ntnu.no/~danilog/Hash/BMW-SecondRound/Supporting_Documentation/Round2Mods.pdf
BibtexAuthor : Danilo Gligoroski, Vlastimil Klima
Title : A Document describing all modifications made on the Blue Midnight Wish cryptographic hash function before entering the Second Round of SHA-3 hash competition
In : -
Address :
Date : 2009
Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, J\orn Amundsen, Stig Frode Mj\olsnes - Cryptographic Hash Function BLUE MIDNIGHT WISH
- ,2008
- http://people.item.ntnu.no/~danilog/Hash/BMW/Supporting_Documentation/BlueMidnightWishDocumentation.pdf
BibtexAuthor : Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, J\orn Amundsen, Stig Frode Mj\olsnes
Title : Cryptographic Hash Function BLUE MIDNIGHT WISH
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
near-collision | compression | all | example | - | Thomsen | |
pseudo-collision | hash | all | 23n/8+1 | - | Thomsen | |
pseudo-preimage | hash | all | 23n/4+1 | - | Thomsen |
A description of this table is given here.
Søren S. Thomsen - A near-collision attack on the Blue Midnight Wish compression function
- ,2008
- http://www2.mat.dtu.dk/people/S.Thomsen/bmw/nc-compress.pdf
BibtexAuthor : Søren S. Thomsen
Title : A near-collision attack on the Blue Midnight Wish compression function
In : -
Address :
Date : 2008
Søren S. Thomsen - Pseudo-cryptanalysis of Blue Midnight Wish