Difference between revisions of "CubeHash"
From The ECRYPT Hash Function Website
m |
m |
||
Line 120: | Line 120: | ||
howpublished = {Available online}, | howpublished = {Available online}, | ||
year = {2009}, | year = {2009}, | ||
− | abstract = {CubeHash is a family of hash functions submitted by Bern stein as a SHA-3 candidate. In this paper, we provide two | + | abstract = {CubeHash is a family of hash functions submitted by Bern stein as a SHA-3 candidate. In this paper, we provide two different cryptanalysis approaches concerning its collision resistance. Thanks to the first approach, related to truncated differentials, we computed a collision for the CubeHash-1/36 hash function, i.e. when for each iteration 36 bytes of message are incorporated and one call to the permutation is applied. Then, the second approach, already used by Dai, much more efficient and simply based on a linearization of the scheme, allowed us to compute a collision for the CubeHash-2/4 hash function. Finally, a theoretical collision attack against CubeHash-2/3, CubeHash-4/4 and CubeHash-4/3 is described. This is currently the best known cryptanalysis result on this SHA-3 candidate.}, |
} | } | ||
</bibtex> | </bibtex> |
Revision as of 12:45, 14 January 2009
1 The algorithm
- Author(s): Dan Bernstein
- Website: http://cubehash.cr.yp.to/
- NIST submission package: CubeHash.zip
Daniel J. Bernstein - CubeHash Specification (2.B.1)
- ,2008
- http://cubehash.cr.yp.to/submission/spec.pdf
BibtexAuthor : Daniel J. Bernstein
Title : CubeHash Specification (2.B.1)
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
preimage | hash | all | 2513-4b | ? | Aumasson,Meier,Naya-Plasencia,Peyrin | |
multi-collision | all | 2513-4b | ? | Aumasson,Meier,Naya-Plasencia,Peyrin | ||
observations | all | Aumasson,Meier,Naya-Plasencia,Peyrin | ||||
preimage | hash | 512 | 2511 | 2508 | Khovratovich,Nikolić,Weinmann | |
preimage | hash | 512 | r/4 | 2496 | - | Khovratovich,Nikolić,Weinmann |
preimage | hash | 512 | r/8 | 2480 | - | Khovratovich,Nikolić,Weinmann |
collision | hash | 512 | 2/120 | example | - | Aumasson |
collision | hash | 512 | 1/45, 2/89 | example | - | Dai |
collision | hash | 512 | 2/4 | example | - | Brier,Peyrin |
collision | hash | 512 | 2/3 | 246 | - | Brier,Peyrin |
collision | hash | 512 | 4/4 | 2189 | - | Brier,Peyrin |
collision | hash | 512 | 4/3 | 2207 | - | Brier,Peyrin |
A description of this table is given here.
Jean-Philippe Aumasson, Willi Meier, María Naya-Plasencia, Thomas Peyrin - Inside the Hypercube
- ,2008
- http://eprint.iacr.org/2008/486.pdf
BibtexAuthor : Jean-Philippe Aumasson, Willi Meier, María Naya-Plasencia, Thomas Peyrin
Title : Inside the Hypercube
In : -
Address :
Date : 2008
Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann - Preimage attack on CubeHash512-r/4 and CubeHash512-r/8
- ,2008
- http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf
BibtexAuthor : Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
Title : Preimage attack on CubeHash512-r/4 and CubeHash512-r/8
In : -
Address :
Date : 2008
Jean-Philippe Aumasson - Collision for CubeHash2/120-512
- ,2008
- http://ehash.iaik.tugraz.at/uploads/a/a9/Cubehash.txt
BibtexAuthor : Jean-Philippe Aumasson
Title : Collision for CubeHash2/120-512
In : -
Address :
Date : 2008
Wei Dai - Collisions for CubeHash1/45 and CubeHash2/89
- ,2008
- http://www.cryptopp.com/sha3/cubehash.pdf
BibtexAuthor : Wei Dai
Title : Collisions for CubeHash1/45 and CubeHash2/89
In : -
Address :
Date : 2008
Eric Brier, Thomas Peyrin - Cryptanalysis of CubeHash