Difference between revisions of "Grindahl-512"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) |
(→Generic Attacks) |
||
(One intermediate revision by one other user not shown) | |||
Line 41: | Line 41: | ||
=== Generic Attacks === | === Generic Attacks === | ||
− | * Grindahl is not a design | + | * Grindahl is not a design following the Merkle-Damgaard construction principle. [[GenericAttacksHash| Generic Attacks on Hash Functions]] |
---- | ---- | ||
=== Collision Attacks === | === Collision Attacks === | ||
+ | |||
+ | ---- | ||
=== Second Preimage Attacks === | === Second Preimage Attacks === |
Latest revision as of 11:39, 31 March 2008
Contents
1 Specification
- Specification: Web page of the Grindahl hash functions
- digest size: 512 bits
- max. message length: < 264 bits
- compression function: 64-bit message block, 104 byte state
Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen - The Grindahl Hash Functions
- FSE 4593:39-57,2007
- http://dx.doi.org/10.1007/978-3-540-74619-5_3
BibtexAuthor : Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen
Title : The Grindahl Hash Functions
In : FSE -
Address :
Date : 2007
2 Cryptanalysis
2.1 Best Known Results
No attacks on Grindahl-512 are known.
2.2 Generic Attacks
- Grindahl is not a design following the Merkle-Damgaard construction principle. Generic Attacks on Hash Functions