Difference between revisions of "Dynamic SHA2"

From The ECRYPT Hash Function Website
m (Cryptanalysis)
(Near-Collision Attack on the Compression Function of Dynamic SHA2)
Line 27: Line 27:
 
| length-extension || hash || all ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt Klima]
 
| length-extension || hash || all ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt Klima]
 
|-                     
 
|-                     
 +
| near-collision || compression || 224/256 ||  || 2<sup>45</sup> || - || [http://eprint.iacr.org/2009/179.pdf Yu,Wang]
 +
|-
 +
| near-collision || compression || 384/512 ||  || 2<sup>75</sup> || - || [http://eprint.iacr.org/2009/179.pdf Yu,Wang]
 +
|-                     
 
|}                     
 
|}                     
  
Line 39: Line 43:
 
   howpublished = {OFFICIAL COMMENT (local link)},
 
   howpublished = {OFFICIAL COMMENT (local link)},
 
   year = {2008},
 
   year = {2008},
 +
}
 +
</bibtex>
 +
 +
<bibtex>
 +
@misc{cryptoeprint:2009:179,
 +
    author = {Hongbo Yu and Xiaoyun Wang},
 +
    title = {Near-Collision Attack on the Compression Function of Dynamic SHA2},
 +
    howpublished = {Cryptology ePrint Archive, Report 2009/179},
 +
    year = {2009},
 +
    url = {http://eprint.iacr.org/2009/179.pdf},
 +
    note = {\url{http://eprint.iacr.org/}},
 +
    abstract = {In this paper, we present a near-collision attack on the compression functions of Dynamic SHA2 for all the output sizes. For the Dynamic SHA2-224/256, the complexity is about $2^{45}$ operations and for the Dynamic SHA2-384/512, the complexity is about $2^{75}$.},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 12:24, 24 April 2009

1 The algorithm


Zijie Xu - Dynamic SHA2

,2008
http://ehash.iaik.tugraz.at/uploads/5/5b/DyamicSHA2.pdf
Bibtex
Author : Zijie Xu
Title : Dynamic SHA2
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
length-extension hash all - - Klima
near-collision compression 224/256 245 - Yu,Wang
near-collision compression 384/512 275 - Yu,Wang

A description of this table is given here.


Vlastimil Klima - Dynamic SHA2 is vulnerable to generic attacks

,2008
http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt
Bibtex
Author : Vlastimil Klima
Title : Dynamic SHA2 is vulnerable to generic attacks
In : -
Address :
Date : 2008

Hongbo Yu, Xiaoyun Wang - Near-Collision Attack on the Compression Function of Dynamic SHA2

,2009
http://eprint.iacr.org/2009/179.pdf
Bibtex
Author : Hongbo Yu, Xiaoyun Wang
Title : Near-Collision Attack on the Compression Function of Dynamic SHA2
In : -
Address :
Date : 2009