Difference between revisions of "CubeHash"

From The ECRYPT Hash Function Website
(Added 4/64 collision)
m (Changed bib ref from ePrint to ACISP proceedings)
Line 63: Line 63:
  
 
<bibtex>
 
<bibtex>
@misc{cubehashAMPP08,
+
@inproceedings{cubehashAMPP09,
 
   author    = {Jean-Philippe Aumasson and Willi Meier and María Naya-Plasencia and Thomas Peyrin},
 
   author    = {Jean-Philippe Aumasson and Willi Meier and María Naya-Plasencia and Thomas Peyrin},
 
   title    = {Inside the Hypercube},
 
   title    = {Inside the Hypercube},
   url       = {http://eprint.iacr.org/2008/486.pdf},
+
  booktitle = {ACISP},
  howpublished = {Cryptology ePrint Archive, Report 2008/486},
+
  year      = {2009},
   year      = {2008},
+
  publisher = {Springer},
 +
  editor = {Colin Boyd and Juan Manuel Gonz{\'a}lez Nieto},
 +
  series    = {LNCS},
 +
  pages    = {202-213},
 +
  volume    = {5594},
 +
   url = {http://www.131002.net/data/papers/ABMNP08.pdf},
 +
   year      = {2009},
 
   abstract  = {Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a block byte size b, and a digest bit length h. The 1024-bit internal state of CubeHash is represented as a five-dimension hypercube. Submissions to NIST have r = 8, b = 1, and $h \in {224, 256, 384, 512}$.  
 
   abstract  = {Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a block byte size b, and a digest bit length h. The 1024-bit internal state of CubeHash is represented as a five-dimension hypercube. Submissions to NIST have r = 8, b = 1, and $h \in {224, 256, 384, 512}$.  
 
This paper gives the first external analysis of CubeHash, with
 
This paper gives the first external analysis of CubeHash, with

Revision as of 15:09, 27 July 2009

1 The algorithm


Daniel J. Bernstein - CubeHash Specification (2.B.1)

,2008
http://cubehash.cr.yp.to/submission/spec.pdf
Bibtex
Author : Daniel J. Bernstein
Title : CubeHash Specification (2.B.1)
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
preimage hash all 2513-4b ? Aumasson,Meier,Naya-Plasencia,Peyrin
multi-collision all 2513-4b ? Aumasson,Meier,Naya-Plasencia,Peyrin
observations all Aumasson,Meier,Naya-Plasencia,Peyrin
preimage hash 512 2511 2508 Khovratovich,Nikolić,Weinmann
preimage hash 512 r/4 2496 - Khovratovich,Nikolić,Weinmann
preimage hash 512 r/8 2480 - Khovratovich,Nikolić,Weinmann
collision hash 512 2/120 example - Aumasson
collision hash 512 1/45, 2/89 example - Dai
collision hash 512 2/4 example - Brier,Peyrin
collision hash all 2/3 246 - Brier,Peyrin
collision hash all 4/4 2189 - Brier,Peyrin
collision hash all 4/3 2207 - Brier,Peyrin
collision hash all 3/64 289 - Brier,Peyrin
collision hash all 5/64 2231 - Brier,Peyrin
collision hash all 2/2 2196 - Brier,Khazaei,Meier,Peyrin
collision hash all 3/64 example (224) - Brier,Khazaei,Meier,Peyrin
collision hash all 4/64 example (234) - Brier,Khazaei,Meier,Peyrin

A description of this table is given here.


Jean-Philippe Aumasson, Willi Meier, María Naya-Plasencia, Thomas Peyrin - Inside the Hypercube

ACISP 5594:202-213,2009
http://www.131002.net/data/papers/ABMNP08.pdf
Bibtex
Author : Jean-Philippe Aumasson, Willi Meier, María Naya-Plasencia, Thomas Peyrin
Title : Inside the Hypercube
In : ACISP -
Address :
Date : 2009

Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann - Preimage attack on CubeHash512-r/4 and CubeHash512-r/8

,2008
http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf
Bibtex
Author : Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
Title : Preimage attack on CubeHash512-r/4 and CubeHash512-r/8
In : -
Address :
Date : 2008

Jean-Philippe Aumasson - Collision for CubeHash2/120-512

,2008
http://ehash.iaik.tugraz.at/uploads/a/a9/Cubehash.txt
Bibtex
Author : Jean-Philippe Aumasson
Title : Collision for CubeHash2/120-512
In : -
Address :
Date : 2008

Wei Dai - Collisions for CubeHash1/45 and CubeHash2/89

,2008
http://www.cryptopp.com/sha3/cubehash.pdf
Bibtex
Author : Wei Dai
Title : Collisions for CubeHash1/45 and CubeHash2/89
In : -
Address :
Date : 2008

Eric Brier, Thomas Peyrin - Cryptanalysis of CubeHash

,2009
http://thomas.peyrin.googlepages.com/BrierPeyrinCubehash.pdf
Bibtex
Author : Eric Brier, Thomas Peyrin
Title : Cryptanalysis of CubeHash
In : -
Address :
Date : 2009

Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin - Attack for CubeHash-2/2 and collision for CubeHash-3/64

,2009
http://ehash.iaik.tugraz.at/uploads/3/3a/Peyrin_ch22_ch364.txt
Bibtex
Author : Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
Title : Attack for CubeHash-2/2 and collision for CubeHash-3/64
In : -
Address :
Date : 2009

Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin - Real Collisions for CubeHash-4/64

,2009
http://ehash.iaik.tugraz.at/uploads/9/93/Bkmp_ch464.txt
Bibtex
Author : Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
Title : Real Collisions for CubeHash-4/64
In : -
Address :
Date : 2009