Difference between revisions of "DHA-256"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) |
(→Others) |
||
Line 45: | Line 45: | ||
=== Others === | === Others === | ||
+ | @misc{cryptoeprint:2005:398, | ||
+ | author = {IAIK Krypto Group}, | ||
+ | title = {Preliminary Analysis of DHA-256}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2005/398}, | ||
+ | year = {2005}, | ||
+ | abstract = {DHA-256 was presented at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 (Double Hash Algorithm) was proposed to enhance the security of SHA-256. We present a preliminary analysis of the message expansion and give an alternative 9-step local collision for DHA-256. }, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | } |
Revision as of 12:34, 3 November 2008
Contents
1 Specification
- digest size: 256 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 256-bit chaining variable
Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong - A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
- ,2005
- http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
BibtexAuthor : Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong
Title : A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
In : -
Address :
Date : 2005
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others
@misc{cryptoeprint:2005:398,
author = {IAIK Krypto Group}, title = {Preliminary Analysis of DHA-256}, howpublished = {Cryptology ePrint Archive, Report 2005/398}, year = {2005}, abstract = {DHA-256 was presented at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 (Double Hash Algorithm) was proposed to enhance the security of SHA-256. We present a preliminary analysis of the message expansion and give an alternative 9-step local collision for DHA-256. }, note = {\url{http://eprint.iacr.org/}},
}