Difference between revisions of "JH"
From The ECRYPT Hash Function Website
m (added link to JHUpdate.zip) |
m (updated link to round 2 submission) |
||
Line 3: | Line 3: | ||
* Author(s): Hongjun Wu | * Author(s): Hongjun Wu | ||
* Website: [http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/ http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/] | * Website: [http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/ http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/] | ||
− | * NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/JH.zip JH.zip], [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/JHUpdate.zip JHUpdate.zip] | + | * NIST submission package: |
+ | ** round 1/2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/JH_Round2.zip JH_Round2.zip] (old versions: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/JH.zip JH.zip], [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/JHUpdate.zip JHUpdate.zip]) | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3W09, | ||
+ | author = {Hongjun Wu}, | ||
+ | title = {The Hash Function JH}, | ||
+ | url = {http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/jh_round2.pdf}, | ||
+ | howpublished = {Submission to NIST (updated)}, | ||
+ | year = {2009}, | ||
+ | } | ||
+ | </bibtex> | ||
<bibtex> | <bibtex> |
Revision as of 17:06, 23 November 2009
1 The algorithm
- Author(s): Hongjun Wu
- Website: http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/
- NIST submission package:
- round 1/2: JH_Round2.zip (old versions: JH.zip, JHUpdate.zip)
Hongjun Wu - The Hash Function JH
- ,2009
- http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/jh_round2.pdf
BibtexAuthor : Hongjun Wu
Title : The Hash Function JH
In : -
Address :
Date : 2009
Hongjun Wu - The Hash Function JH
- ,2008
- http://icsd.i2r.a-star.edu.sg/staff/hongjun/jh/jh.pdf
BibtexAuthor : Hongjun Wu
Title : The Hash Function JH
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
pseudo-collision | compression | all | - | - | Bagheri | |
pseudo-2nd preimage | compression | all | - | - | Bagheri | |
preimage(1) | hash | 512 | 2510.3 (+ 2524 MA + 2524 CMP) | 2510.3 (Wu: 2510.6) | Mendel,Thomsen, Wu |
A description of this table is given here.
(1) Wu has analyzed the exact memory requirements, additional memory accesses (MA) and comparisons (CMP) of the attack by Mendel and Thomsen.
Nasour Bagheri - Pseudo-collision and pseudo-second preimage on JH
- ,2008
- http://ehash.iaik.tugraz.at/uploads/a/a8/Jh1.txt
BibtexAuthor : Nasour Bagheri
Title : Pseudo-collision and pseudo-second preimage on JH
In : -
Address :
Date : 2008
Florian Mendel, Søren S. Thomsen - An Observation on JH-512
- ,2008
- http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf
BibtexAuthor : Florian Mendel, Søren S. Thomsen
Title : An Observation on JH-512
In : -
Address :
Date : 2008
Hongjun Wu - The Complexity of Mendel and Thomsen's Preimage Attack on JH-512