Difference between revisions of "DCH"

From The ECRYPT Hash Function Website
(Cryptanalysis)
(Cryptanalysis)
Line 23: Line 23:
 
   url      = {http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf},
 
   url      = {http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
   abstract  = {In this paper, we show practical collision and preimage attacks
+
   abstract  = {In this paper, we show practical collision and preimage attacks on DCH-n. The attacks are based on the observation of Khovratovich and Nikolic that the chaining value is not used in the underlying block cipher. Based on this observation, we show a trivial collision resp. multi-collision attack on DCH-n and a preimage attack with a complexity of about 583 compression function evaluations.},
on DCH-n. The attacks are based on the observation of Khovratovich
 
and Nikolic that the chaining value is not used in the underlying
 
block cipher. Based on this observation, we show a trivial collision
 
resp. multi-collision attack on DCH-n and a preimage attack with a complexity
 
of about 583 compression function evaluations.},
 
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}
Line 40: Line 35:
 
   url        = {http://lj.streamclub.ru/papers/hash/dch.pdf},
 
   url        = {http://lj.streamclub.ru/papers/hash/dch.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
   abstract  = {We present collision and preimage attacks on DCH-n. The attacks exploit a design
+
   abstract  = {We present collision and preimage attacks on DCH-n. The attacks exploit a design weakness of the underlying compression function. Both attacks require 2^45 computations and memory.},
weakness of the underlying compression function. Both attacks require 2^45 computations and memory.},
 
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}

Revision as of 13:43, 27 November 2008