Difference between revisions of "DCH"

From The ECRYPT Hash Function Website
(Cryptanalysis)
(Practical Collision and Preimage Attack on DCH-n)
Line 23: Line 23:
 
   url      = {http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf},
 
   url      = {http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
   abstract  = {In this paper, we show practical collision and preimage attacks on DCH-n. The attacks are based on the observation of Khovratovich and Nikolic that the chaining value is not used in the underlying block cipher. Based on this observation, we show a trivial collision resp. multi-collision attack on DCH-n and a preimage attack with a complexity of about 583 compression function evaluations.},
+
   abstract  = {In this paper, we show practical collision and preimage attacks on DCH-n. The attacks are based on the observation of Khovratovich and Nikolic that the chaining value is not used in the underlying block cipher. Based on this observation, we show a trivial collision resp. multi-collision attack on DCH-n and a preimage attack with a complexity of about 521 compression function evaluations.},
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}

Revision as of 14:22, 3 December 2008