Difference between revisions of "DASH"

From The ECRYPT Hash Function Website
 
 
Line 1: Line 1:
 
== Specification ==
 
== Specification ==
  
<!--
+
* digest size: 256 bits
* digest size: 160 bits
 
 
* max. message length: < 2<sup>64</sup> bits
 
* max. message length: < 2<sup>64</sup> bits
* compression function: 512-bit message block, 160-bit chaining variable
+
* compression function: 1920-bit message block, 256-bit chaining variable
 
* Specification:  
 
* Specification:  
-->
+
 
 +
<bibtex>
 +
@inproceedings{acispBilletRSY08,
 +
  author    = {Olivier Billet and Matthew J. B. Robshaw and Yannick Seurin and Yiqun Lisa Yin},
 +
  title    = {Looking Back at a New Hash Function},
 +
  booktitle = {ACISP},
 +
  year      = {2008},
 +
  pages    = {239-253},
 +
  abstract  = {We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explore the computational trade-off between the key schedule and encryption in a block cipher-based hash function and we illustrate our approach with a 256-bit hash function that has a hashing rate equivalent to the encryption rate of AES-128. The design extends naturally to a 512-bit hash function.},
 +
  url        = {http://dx.doi.org/10.1007/978-3-540-70500-0_18},
 +
  editor    = {Yi Mu and Willy Susilo and Jennifer Seberry},
 +
  publisher = {Springer},
 +
  series    = {LNCS},
 +
  volume    = {5107},
 +
  isbn      = {978-3-540-69971-2},
 +
}
 +
</bibtex>
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==

Latest revision as of 13:55, 10 November 2008

1 Specification

  • digest size: 256 bits
  • max. message length: < 264 bits
  • compression function: 1920-bit message block, 256-bit chaining variable
  • Specification:

Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin - Looking Back at a New Hash Function

ACISP 5107:239-253,2008
http://dx.doi.org/10.1007/978-3-540-70500-0_18
Bibtex
Author : Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin
Title : Looking Back at a New Hash Function
In : ACISP -
Address :
Date : 2008

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others