Difference between revisions of "ECOH"

From The ECRYPT Hash Function Website
m
(Added Halcrow/Ferguson attack on ECOH)
 
(One intermediate revision by one other user not shown)
Line 6: Line 6:
 
-->
 
-->
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/ECOH.zip ECOH.zip]
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/ECOH.zip ECOH.zip]
 +
  
 
<bibtex>
 
<bibtex>
Line 11: Line 12:
 
   author    = {Daniel R. L. Brown and Adrian Antipa and Matt Campagna and Rene Struik},
 
   author    = {Daniel R. L. Brown and Adrian Antipa and Matt Campagna and Rene Struik},
 
   title    = {ECOH: the Elliptic Curve Only Hash},
 
   title    = {ECOH: the Elliptic Curve Only Hash},
   url        = {},
+
   url        = {http://ehash.iaik.tugraz.at/uploads/a/a5/Ecoh.pdf},
 
   howpublished = {Submission to NIST},
 
   howpublished = {Submission to NIST},
 
   year      = {2008},
 
   year      = {2008},
Line 19: Line 20:
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
* None yet
+
{| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center"                 
 +
|- style="background:#efefef;"                 
 +
|    Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||  Reference
 +
|-                                       
 +
|  style="background:orange" | 2nd preimage || hash || 224,256 ||  || 2<sup>143</sup> || - || [http://eprint.iacr.org/2009/168.pdf Halcrow,Ferguson]
 +
|-
 +
|  style="background:orange" | 2nd preimage || hash || 384 ||  || 2<sup>206</sup> || - || [http://eprint.iacr.org/2009/168.pdf Halcrow,Ferguson]
 +
|-
 +
 
 +
|  style="background:orange" | 2nd preimage || hash || 512 ||  || 2<sup>287</sup> || - || [http://eprint.iacr.org/2009/168.pdf Halcrow,Ferguson]
 +
|-
 +
|}                   
 +
 
 +
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].
 +
 
 +
 
 +
<bibtex>
 +
@misc{ecohHF09,
 +
    author = {Michael A. Halcrow and Niels Ferguson},
 +
    title = {A Second Pre-image Attack Against Elliptic Curve Only Hash ({ECOH})},
 +
    howpublished = {Cryptology ePrint Archive, Report 2009/168},
 +
    year = {2009},
 +
    note = {\url{http://eprint.iacr.org/}},
 +
    url = {http://eprint.iacr.org/2009/168.pdf},
 +
    abstract = {We present a second pre-image attack on ECOH. Our attack requires $2^{143}$ time for ECOH-224 and ECOH-256, $2^{206}$ time for ECOH-384, and $2^{287}$ time for ECOH-512. The attack sets the checksum block to a fixed value and uses a collision search on the elliptic curve points.},
 +
}
 +
</bibtex>

Latest revision as of 09:15, 11 April 2009

1 The algorithm

  • Author(s): Daniel R. L. Brown, Adrian Antipa, Matt Campagna, Rene Struik
  • NIST submission package: ECOH.zip


Daniel R. L. Brown, Adrian Antipa, Matt Campagna, Rene Struik - ECOH: the Elliptic Curve Only Hash

,2008
http://ehash.iaik.tugraz.at/uploads/a/a5/Ecoh.pdf
Bibtex
Author : Daniel R. L. Brown, Adrian Antipa, Matt Campagna, Rene Struik
Title : ECOH: the Elliptic Curve Only Hash
In : -
Address :
Date : 2008

2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash 224,256 2143 - Halcrow,Ferguson
2nd preimage hash 384 2206 - Halcrow,Ferguson
2nd preimage hash 512 2287 - Halcrow,Ferguson

A description of this table is given here.


Michael A. Halcrow, Niels Ferguson - A Second Pre-image Attack Against Elliptic Curve Only Hash ({ECOH})

,2009
http://eprint.iacr.org/2009/168.pdf
Bibtex
Author : Michael A. Halcrow, Niels Ferguson
Title : A Second Pre-image Attack Against Elliptic Curve Only Hash ({ECOH})
In : -
Address :
Date : 2009