Difference between revisions of "CubeHash"
From The ECRYPT Hash Function Website
(Added Brier-Peyrin collisions on CubeHash) |
|||
Line 24: | Line 24: | ||
|- | |- | ||
| style="background:greenyellow" | preimage || hash || all || || 2<sup>513-4b</sup> || ? || [http://eprint.iacr.org/2008/486.pdf Aumasson,Meier,Naya-Plasencia,Peyrin] | | style="background:greenyellow" | preimage || hash || all || || 2<sup>513-4b</sup> || ? || [http://eprint.iacr.org/2008/486.pdf Aumasson,Meier,Naya-Plasencia,Peyrin] | ||
+ | |- | ||
+ | | multi-collision || || all || || 2<sup>513-4b</sup> || ? || [http://eprint.iacr.org/2008/486.pdf Aumasson,Meier,Naya-Plasencia,Peyrin] | ||
|- | |- | ||
+ | | observations || || all || || || || [http://eprint.iacr.org/2008/486.pdf Aumasson,Meier,Naya-Plasencia,Peyrin] | ||
+ | |- | ||
| style="background:greenyellow" | preimage || hash || 512 || || 2<sup>511</sup> || 2<sup>508</sup> || [http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf Khovratovich,Nikolić,Weinmann] | | style="background:greenyellow" | preimage || hash || 512 || || 2<sup>511</sup> || 2<sup>508</sup> || [http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf Khovratovich,Nikolić,Weinmann] | ||
|- | |- | ||
Line 36: | Line 40: | ||
|- | |- | ||
| collision || hash || 512 || 2/4 || example || - || [http://ehash.iaik.tugraz.at/uploads/d/d5/Peyrin_cubehashcollision.txt Peyrin] | | collision || hash || 512 || 2/4 || example || - || [http://ehash.iaik.tugraz.at/uploads/d/d5/Peyrin_cubehashcollision.txt Peyrin] | ||
− | |- | + | |- |
− | | | + | | collision || hash || 512 || 2/3 || 2<sup>46</sup> || - || [http://thomas.peyrin.googlepages.com/Brier_Peyrin_cubehash.pdf Brier,Peyrin] |
− | |- | + | |- |
− | | | + | | collision || hash || 512 || 4/4 || 2<sup>189</sup> || - || [http://thomas.peyrin.googlepages.com/Brier_Peyrin_cubehash.pdf Brier,Peyrin] |
− | |- | + | |- |
+ | | collision || hash || 512 || 4/3 || 2<sup>207</sup> || - || [http://thomas.peyrin.googlepages.com/Brier_Peyrin_cubehash.pdf Brier,Peyrin] | ||
+ | |- | ||
|} | |} | ||
Line 102: | Line 108: | ||
url = {http://ehash.iaik.tugraz.at/uploads/d/d5/Peyrin_cubehashcollision.txt}, | url = {http://ehash.iaik.tugraz.at/uploads/d/d5/Peyrin_cubehashcollision.txt}, | ||
howpublished = {NIST mailing list (local link)}, | howpublished = {NIST mailing list (local link)}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{cubehashBP09, | ||
+ | author = {Eric Brier and Thomas Peyrin}, | ||
+ | title = {Cryptanalysis of CubeHash}, | ||
+ | url = {http://thomas.peyrin.googlepages.com/Brier_Peyrin_cubehash.pdf}, | ||
+ | howpublished = {Available online}, | ||
year = {2009}, | year = {2009}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 08:03, 9 January 2009
1 The algorithm
- Author(s): Dan Bernstein
- Website: http://cubehash.cr.yp.to/
- NIST submission package: CubeHash.zip
Daniel J. Bernstein - CubeHash Specification (2.B.1)
- ,2008
- http://cubehash.cr.yp.to/submission/spec.pdf
BibtexAuthor : Daniel J. Bernstein
Title : CubeHash Specification (2.B.1)
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
preimage | hash | all | 2513-4b | ? | Aumasson,Meier,Naya-Plasencia,Peyrin | |
multi-collision | all | 2513-4b | ? | Aumasson,Meier,Naya-Plasencia,Peyrin | ||
observations | all | Aumasson,Meier,Naya-Plasencia,Peyrin | ||||
preimage | hash | 512 | 2511 | 2508 | Khovratovich,Nikolić,Weinmann | |
preimage | hash | 512 | r/4 | 2496 | - | Khovratovich,Nikolić,Weinmann |
preimage | hash | 512 | r/8 | 2480 | - | Khovratovich,Nikolić,Weinmann |
collision | hash | 512 | 2/120 | example | - | Aumasson |
collision | hash | 512 | 1/45, 2/89 | example | - | Dai |
collision | hash | 512 | 2/4 | example | - | Peyrin |
collision | hash | 512 | 2/3 | 246 | - | Brier,Peyrin |
collision | hash | 512 | 4/4 | 2189 | - | Brier,Peyrin |
collision | hash | 512 | 4/3 | 2207 | - | Brier,Peyrin |
A description of this table is given here.
Jean-Philippe Aumasson, Willi Meier, María Naya-Plasencia, Thomas Peyrin - Inside the Hypercube
- ,2008
- http://eprint.iacr.org/2008/486.pdf
BibtexAuthor : Jean-Philippe Aumasson, Willi Meier, María Naya-Plasencia, Thomas Peyrin
Title : Inside the Hypercube
In : -
Address :
Date : 2008
Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann - Preimage attack on CubeHash512-r/4 and CubeHash512-r/8
- ,2008
- http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf
BibtexAuthor : Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
Title : Preimage attack on CubeHash512-r/4 and CubeHash512-r/8
In : -
Address :
Date : 2008
Jean-Philippe Aumasson - Collision for CubeHash2/120-512
- ,2008
- http://ehash.iaik.tugraz.at/uploads/a/a9/Cubehash.txt
BibtexAuthor : Jean-Philippe Aumasson
Title : Collision for CubeHash2/120-512
In : -
Address :
Date : 2008
Wei Dai - Collisions for CubeHash1/45 and CubeHash2/89
- ,2008
- http://www.cryptopp.com/sha3/cubehash.pdf
BibtexAuthor : Wei Dai
Title : Collisions for CubeHash1/45 and CubeHash2/89
In : -
Address :
Date : 2008
Thomas Peyrin - Collision for CubeHash2/4
- ,2009
- http://ehash.iaik.tugraz.at/uploads/d/d5/Peyrin_cubehashcollision.txt
BibtexAuthor : Thomas Peyrin
Title : Collision for CubeHash2/4
In : -
Address :
Date : 2009
Eric Brier, Thomas Peyrin - Cryptanalysis of CubeHash