Difference between revisions of "ECOH"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m |
(Added Halcrow/Ferguson attack on ECOH) |
||
(One intermediate revision by one other user not shown) | |||
Line 6: | Line 6: | ||
--> | --> | ||
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/ECOH.zip ECOH.zip] | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/ECOH.zip ECOH.zip] | ||
+ | |||
<bibtex> | <bibtex> | ||
Line 11: | Line 12: | ||
author = {Daniel R. L. Brown and Adrian Antipa and Matt Campagna and Rene Struik}, | author = {Daniel R. L. Brown and Adrian Antipa and Matt Campagna and Rene Struik}, | ||
title = {ECOH: the Elliptic Curve Only Hash}, | title = {ECOH: the Elliptic Curve Only Hash}, | ||
− | url = {}, | + | url = {http://ehash.iaik.tugraz.at/uploads/a/a5/Ecoh.pdf}, |
howpublished = {Submission to NIST}, | howpublished = {Submission to NIST}, | ||
year = {2008}, | year = {2008}, | ||
Line 19: | Line 20: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | |
+ | |- style="background:#efefef;" | ||
+ | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | | style="background:orange" | 2nd preimage || hash || 224,256 || || 2<sup>143</sup> || - || [http://eprint.iacr.org/2009/168.pdf Halcrow,Ferguson] | ||
+ | |- | ||
+ | | style="background:orange" | 2nd preimage || hash || 384 || || 2<sup>206</sup> || - || [http://eprint.iacr.org/2009/168.pdf Halcrow,Ferguson] | ||
+ | |- | ||
+ | |||
+ | | style="background:orange" | 2nd preimage || hash || 512 || || 2<sup>287</sup> || - || [http://eprint.iacr.org/2009/168.pdf Halcrow,Ferguson] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{ecohHF09, | ||
+ | author = {Michael A. Halcrow and Niels Ferguson}, | ||
+ | title = {A Second Pre-image Attack Against Elliptic Curve Only Hash ({ECOH})}, | ||
+ | howpublished = {Cryptology ePrint Archive, Report 2009/168}, | ||
+ | year = {2009}, | ||
+ | note = {\url{http://eprint.iacr.org/}}, | ||
+ | url = {http://eprint.iacr.org/2009/168.pdf}, | ||
+ | abstract = {We present a second pre-image attack on ECOH. Our attack requires $2^{143}$ time for ECOH-224 and ECOH-256, $2^{206}$ time for ECOH-384, and $2^{287}$ time for ECOH-512. The attack sets the checksum block to a fixed value and uses a collision search on the elliptic curve points.}, | ||
+ | } | ||
+ | </bibtex> |
Latest revision as of 09:15, 11 April 2009
1 The algorithm
- Author(s): Daniel R. L. Brown, Adrian Antipa, Matt Campagna, Rene Struik
- NIST submission package: ECOH.zip
Daniel R. L. Brown, Adrian Antipa, Matt Campagna, Rene Struik - ECOH: the Elliptic Curve Only Hash
- ,2008
- http://ehash.iaik.tugraz.at/uploads/a/a5/Ecoh.pdf
BibtexAuthor : Daniel R. L. Brown, Adrian Antipa, Matt Campagna, Rene Struik
Title : ECOH: the Elliptic Curve Only Hash
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
2nd preimage | hash | 224,256 | 2143 | - | Halcrow,Ferguson | |
2nd preimage | hash | 384 | 2206 | - | Halcrow,Ferguson | |
2nd preimage | hash | 512 | 2287 | - | Halcrow,Ferguson |
A description of this table is given here.
Michael A. Halcrow, Niels Ferguson - A Second Pre-image Attack Against Elliptic Curve Only Hash ({ECOH})