Difference between revisions of "DHA-256"

From The ECRYPT Hash Function Website
(Others)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
== Specification ==
 
== Specification ==
  
<!--
+
* digest size: 256 bits
* digest size: 160 bits
 
 
* max. message length: < 2<sup>64</sup> bits
 
* max. message length: < 2<sup>64</sup> bits
* compression function: 512-bit message block, 160-bit chaining variable
+
* compression function: 512-bit message block, 256-bit chaining variable
 +
<!--
 +
* Specification: http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
 
-->
 
-->
* Specification: http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
 
  
 
<bibtex>
 
<bibtex>
Line 45: Line 45:
  
 
=== Others ===
 
=== Others ===
 +
<bibtex>
 +
@misc{cryptoeprint:2005:398,
 +
    author = {IAIK Krypto Group},
 +
    title = {Preliminary Analysis of DHA-256},
 +
    howpublished = {Cryptology ePrint Archive, Report 2005/398},
 +
    year = {2005},
 +
    abstract = {DHA-256 was presented at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 (Double Hash Algorithm) was proposed to enhance the security of SHA-256. We present a preliminary analysis of the message expansion and give an alternative 9-step local collision for DHA-256. },
 +
    note = {\url{http://eprint.iacr.org/}},
 +
}
 +
</bibtex>

Latest revision as of 12:34, 3 November 2008

1 Specification

  • digest size: 256 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 256-bit chaining variable

Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong - A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256

,2005
http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
Bibtex
Author : Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong
Title : A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
In : -
Address :
Date : 2005

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

IAIK Krypto Group - Preliminary Analysis of DHA-256

,2005
Bibtex
Author : IAIK Krypto Group
Title : Preliminary Analysis of DHA-256
In : -
Address :
Date : 2005