Difference between revisions of "Hamsi"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) (link to updated reference implementation added) |
Mschlaeffer (talk | contribs) (analy) |
||
Line 23: | Line 23: | ||
|- style="background:#efefef;" | |- style="background:#efefef;" | ||
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
− | |- | + | |- |
| | non-randomness || compression function || 224, 256 || 5 rounds || || || [http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt Aumasson] | | | non-randomness || compression function || 224, 256 || 5 rounds || || || [http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt Aumasson] | ||
− | |- | + | |- |
− | |} | + | | | near-collision || compression function || 224, 256 || 3 rounds || 2<sup>21</sup> || || [http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf Nikolic] |
+ | |- | ||
+ | |} | ||
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
− | |||
Line 38: | Line 39: | ||
url = {http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt}, | url = {http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt}, | ||
howpublished = {NIST mailing list (local link)} | howpublished = {NIST mailing list (local link)} | ||
+ | year = {2009}, | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{hamsiN09, | ||
+ | author = {Ivica Nikolic}, | ||
+ | title = {Near Collisions for the Compression Function of Hamsi-256}, | ||
+ | url = {http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf}, | ||
+ | howpublished = {CRYPTO rump session} | ||
year = {2009}, | year = {2009}, | ||
</bibtex> | </bibtex> |
Revision as of 19:34, 14 September 2009
1 The algorithm
- Author(s): Özgül Kücük
- Website: http://homes.esat.kuleuven.be/~okucuk/hamsi/
- NIST submission package: Hamsi.zip, HamsiUpdate.zip
- an updated reference implementation can be found here (Hamsi website)
Özgül Kücük - The Hash Function Hamsi
- ,2008
- http://ehash.iaik.tugraz.at/uploads/9/95/Hamsi.pdf
BibtexAuthor : Özgül Kücük
Title : The Hash Function Hamsi
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
non-randomness | compression function | 224, 256 | 5 rounds | Aumasson | ||
near-collision | compression function | 224, 256 | 3 rounds | 221 | Nikolic |
A description of this table is given here.
Jean-Philippe Aumasson - On the pseudorandomness of Hamsi
- ,2009
- http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt
BibtexAuthor : Jean-Philippe Aumasson
Title : On the pseudorandomness of Hamsi
In : -
Address :
Date : 2009
Ivica Nikolic - Near Collisions for the Compression Function of Hamsi-256