Difference between revisions of "DCH"

From The ECRYPT Hash Function Website
(Cryptanalysis)
(Cryptanalysis)
Line 21: Line 21:
 
   author    = {Mario Lamberger and Florian Mendel},
 
   author    = {Mario Lamberger and Florian Mendel},
 
   title    = {Practical Collision and Preimage Attack on DCH-n},
 
   title    = {Practical Collision and Preimage Attack on DCH-n},
   url       = {http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf},
+
   url       = {http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 +
  abstract  = {In this paper, we show practical collision and preimage attacks
 +
on DCH-n. The attacks are based on the observation of Khovratovich
 +
and Nikolic that the chaining value is not used in the underlying
 +
block cipher. Based on this observation, we show a trivial collision
 +
resp. multi-collision attack on DCH-n and a preimage attack with a complexity
 +
of about 583 compression function evaluations.},
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}
Line 34: Line 40:
 
   url        = {http://lj.streamclub.ru/papers/hash/dch.pdf},
 
   url        = {http://lj.streamclub.ru/papers/hash/dch.pdf},
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 +
  abstract  = {We present collision and preimage attacks on DCH-n. The attacks exploit a design
 +
weakness of the underlying compression function. Both attacks require 2^45 computations and memory.},
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}

Revision as of 13:41, 27 November 2008