Difference between revisions of "JH"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m (complexities by Wu) |
Mschlaeffer (talk | contribs) m (complexities by Wu) |
||
Line 27: | Line 27: | ||
| | pseudo-2nd preimage || compression || all || || - || - || [http://ehash.iaik.tugraz.at/uploads/a/a8/Jh1.txt Bagheri] | | | pseudo-2nd preimage || compression || all || || - || - || [http://ehash.iaik.tugraz.at/uploads/a/a8/Jh1.txt Bagheri] | ||
|- | |- | ||
− | | style="background:greenyellow" | preimage || hash || 512 || || 2<sup>510.3</sup> (MA: 2<sup>524</sup>, CMP: 2<sup>524</sup>) || 2<sup>510.3</sup> ( | + | | style="background:greenyellow" | preimage<sup>(1)</sup> || hash || 512 || || 2<sup>510.3</sup> (MA: 2<sup>524</sup>, CMP: 2<sup>524</sup>) || 2<sup>510.3</sup> (2<sup>510.6</sup>) || [http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf Mendel,Thomsen], [http://ehash.iaik.tugraz.at/uploads/6/6f/Jh_mt_complexity.pdf Wu] |
|- | |- | ||
|} | |} | ||
Line 34: | Line 34: | ||
<sup>(1)</sup> Wu has analyzed the memory requirements, memory accesses (MA) and comparisions (CMP) of the attack by Mendel and Thomsen in detail. | <sup>(1)</sup> Wu has analyzed the memory requirements, memory accesses (MA) and comparisions (CMP) of the attack by Mendel and Thomsen in detail. | ||
+ | |||
<bibtex> | <bibtex> |
Revision as of 14:46, 8 January 2009
1 The algorithm
- Author(s): Hongjun Wu
- Website: http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/
- NIST submission package: JH.zip
Hongjun Wu - The Hash Function JH
- ,2008
- http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/jh.pdf
BibtexAuthor : Hongjun Wu
Title : The Hash Function JH
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
pseudo-collision | compression | all | - | - | Bagheri | |
pseudo-2nd preimage | compression | all | - | - | Bagheri | |
preimage(1) | hash | 512 | 2510.3 (MA: 2524, CMP: 2524) | 2510.3 (2510.6) | Mendel,Thomsen, Wu |
A description of this table is given here.
(1) Wu has analyzed the memory requirements, memory accesses (MA) and comparisions (CMP) of the attack by Mendel and Thomsen in detail.
Nasour Bagheri - Pseudo-collision and pseudo-second preimage on JH
- ,2008
- http://ehash.iaik.tugraz.at/uploads/a/a8/Jh1.txt
BibtexAuthor : Nasour Bagheri
Title : Pseudo-collision and pseudo-second preimage on JH
In : -
Address :
Date : 2008
Florian Mendel, Søren S. Thomsen - An Observation on JH-512
- ,2008
- http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf
BibtexAuthor : Florian Mendel, Søren S. Thomsen
Title : An Observation on JH-512
In : -
Address :
Date : 2008
Hongjun Wu - The Complexity of Mendel and Thomsen's Preimage Attack on JH-512