Difference between revisions of "DHA-256"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) |
(→Others) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
== Specification == | == Specification == | ||
− | + | * digest size: 256 bits | |
− | * digest size: | ||
* max. message length: < 2<sup>64</sup> bits | * max. message length: < 2<sup>64</sup> bits | ||
− | * compression function: 512-bit message block, | + | * compression function: 512-bit message block, 256-bit chaining variable |
+ | <!-- | ||
+ | * Specification: http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf | ||
--> | --> | ||
− | |||
<bibtex> | <bibtex> | ||
Line 45: | Line 45: | ||
=== Others === | === Others === | ||
+ | <bibtex> | ||
+ | @misc{cryptoeprint:2005:398, | ||
+ | author = {IAIK Krypto Group}, | ||
+ | title = {Preliminary Analysis of DHA-256}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2005/398}, | ||
+ | year = {2005}, | ||
+ | abstract = {DHA-256 was presented at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 (Double Hash Algorithm) was proposed to enhance the security of SHA-256. We present a preliminary analysis of the message expansion and give an alternative 9-step local collision for DHA-256. }, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } | ||
+ | </bibtex> |
Latest revision as of 12:34, 3 November 2008
Contents
1 Specification
- digest size: 256 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 256-bit chaining variable
Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong - A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
- ,2005
- http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
BibtexAuthor : Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong
Title : A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
In : -
Address :
Date : 2005
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others
IAIK Krypto Group - Preliminary Analysis of DHA-256