Difference between revisions of "External Cryptanalysis Categories"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) |
Mschlaeffer (talk | contribs) |
||
Line 1: | Line 1: | ||
− | For presentation reasons, we provide a simplified overview about cryptanalytic results in | + | For presentation reasons, we provide a simplified overview about cryptanalytic results in [[The SHA-3 Zoo]]. We only consider cryptanalytic results that have not been performed by the designers themselves and are included in the initial proposal, hence the name 'external'. Exceptions are cryptanalytic results by non-designers and cryptanalytic results by designers that are not mentioned in the proposal. |
We use the following categories for External Cryptanalysis: | We use the following categories for External Cryptanalysis: | ||
* none: no external cryptanalysis is known | * none: no external cryptanalysis is known | ||
− | * yes: | + | * yes: there are cryptanalytic results known |
* broken: external cryptanalytic results disprove claims by the designers and/or requirements for a future SHA-3 | * broken: external cryptanalytic results disprove claims by the designers and/or requirements for a future SHA-3 |
Latest revision as of 00:25, 6 November 2008
For presentation reasons, we provide a simplified overview about cryptanalytic results in The SHA-3 Zoo. We only consider cryptanalytic results that have not been performed by the designers themselves and are included in the initial proposal, hence the name 'external'. Exceptions are cryptanalytic results by non-designers and cryptanalytic results by designers that are not mentioned in the proposal.
We use the following categories for External Cryptanalysis:
- none: no external cryptanalysis is known
- yes: there are cryptanalytic results known
- broken: external cryptanalytic results disprove claims by the designers and/or requirements for a future SHA-3