Difference between revisions of "Dynamic SHA2"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m (→Cryptanalysis) |
(Near-Collision Attack on the Compression Function of Dynamic SHA2) |
||
Line 27: | Line 27: | ||
| length-extension || hash || all || || - || - || [http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt Klima] | | length-extension || hash || all || || - || - || [http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt Klima] | ||
|- | |- | ||
+ | | near-collision || compression || 224/256 || || 2<sup>45</sup> || - || [http://eprint.iacr.org/2009/179.pdf Yu,Wang] | ||
+ | |- | ||
+ | | near-collision || compression || 384/512 || || 2<sup>75</sup> || - || [http://eprint.iacr.org/2009/179.pdf Yu,Wang] | ||
+ | |- | ||
|} | |} | ||
Line 39: | Line 43: | ||
howpublished = {OFFICIAL COMMENT (local link)}, | howpublished = {OFFICIAL COMMENT (local link)}, | ||
year = {2008}, | year = {2008}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{cryptoeprint:2009:179, | ||
+ | author = {Hongbo Yu and Xiaoyun Wang}, | ||
+ | title = {Near-Collision Attack on the Compression Function of Dynamic SHA2}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2009/179}, | ||
+ | year = {2009}, | ||
+ | url = {http://eprint.iacr.org/2009/179.pdf}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | abstract = {In this paper, we present a near-collision attack on the compression functions of Dynamic SHA2 for all the output sizes. For the Dynamic SHA2-224/256, the complexity is about $2^{45}$ operations and for the Dynamic SHA2-384/512, the complexity is about $2^{75}$.}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 12:24, 24 April 2009
1 The algorithm
- Author(s): Zijie Xu
- NIST submission package: DyamicSHA2.zip
Zijie Xu - Dynamic SHA2
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/5b/DyamicSHA2.pdf
BibtexAuthor : Zijie Xu
Title : Dynamic SHA2
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
length-extension | hash | all | - | - | Klima | |
near-collision | compression | 224/256 | 245 | - | Yu,Wang | |
near-collision | compression | 384/512 | 275 | - | Yu,Wang |
A description of this table is given here.
Vlastimil Klima - Dynamic SHA2 is vulnerable to generic attacks
- ,2008
- http://ehash.iaik.tugraz.at/uploads/0/0e/Dynamic-sha2_length-extension.txt
BibtexAuthor : Vlastimil Klima
Title : Dynamic SHA2 is vulnerable to generic attacks
In : -
Address :
Date : 2008
Hongbo Yu, Xiaoyun Wang - Near-Collision Attack on the Compression Function of Dynamic SHA2