Difference between revisions of "Dynamic SHA"

From The ECRYPT Hash Function Website
m (Cryptanalysis)
m (Added details in the BibTeX "howpublished" field)
Line 45: Line 45:
 
   title    = {Cryptanalysis of Dynamic SHA},
 
   title    = {Cryptanalysis of Dynamic SHA},
 
   url = {http://ehash.iaik.tugraz.at/uploads/c/c2/Dsha.pdf},
 
   url = {http://ehash.iaik.tugraz.at/uploads/c/c2/Dsha.pdf},
   howpublished = {presentation slides available online (local link)},
+
   howpublished = {FSE 2009 rump session, slides available online (local link)},
 
   year = {2009},
 
   year = {2009},
 
}
 
}

Revision as of 13:13, 3 March 2009

1 The algorithm


Zijie Xu - Dynamic SHA

,2008
http://ehash.iaik.tugraz.at/uploads/e/e2/DyamicSHA.pdf
Bibtex
Author : Zijie Xu
Title : Dynamic SHA
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash 256 2114 - Indesteege
collision hash 512 2170 - Indesteege
preimage compression 256 2216 - Indesteege
preimage compression 512 2256 - Indesteege
length-extension hash all - - Klima

A description of this table is given here.


Sebastiaan Indesteege - Cryptanalysis of Dynamic SHA

,2009
http://ehash.iaik.tugraz.at/uploads/c/c2/Dsha.pdf
Bibtex
Author : Sebastiaan Indesteege
Title : Cryptanalysis of Dynamic SHA
In : -
Address :
Date : 2009

Vlastimil Klima - Dynamic SHA is vulnerable to generic attacks

,2008
http://ehash.iaik.tugraz.at/uploads/e/e7/Dynamic-sha_length-extension.txt
Bibtex
Author : Vlastimil Klima
Title : Dynamic SHA is vulnerable to generic attacks
In : -
Address :
Date : 2008