Difference between revisions of "Khichidi-1"

From The ECRYPT Hash Function Website
 
(Added Thandra's collision and second-preimage attacks on Khichidi.1)
 
(3 intermediate revisions by one other user not shown)
Line 6: Line 6:
 
-->
 
-->
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Khichidi-1.zip Khichidi-1.zip]
 
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Khichidi-1.zip Khichidi-1.zip]
 +
  
 
<bibtex>
 
<bibtex>
Line 11: Line 12:
 
   author    = {Natarajan Vijayarangan},
 
   author    = {Natarajan Vijayarangan},
 
   title    = {A NEW HASH ALGORITHM: Khichidi-1},
 
   title    = {A NEW HASH ALGORITHM: Khichidi-1},
   url        = {},
+
   url        = {http://ehash.iaik.tugraz.at/uploads/d/d4/Khichidi-1.pdf},
 
   howpublished = {Submission to NIST},
 
   howpublished = {Submission to NIST},
 
   year      = {2008},
 
   year      = {2008},
 
}
 
}
 
</bibtex>
 
</bibtex>
 +
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
* None yet
+
{| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center"                 
 +
|- style="background:#efefef;"                 
 +
|  Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||  Reference
 +
|-                                     
 +
|  style="background:red" | collision || hash || 256 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/8/89/Khichidi-1.txt Mouha]
 +
|-         
 +
|  style="background:orange" | collision || hash || all ||  || 1 || - || [http://ehash.iaik.tugraz.at/uploads/5/5c/Thandra_Khichidi.pdf Thandra]
 +
|- 
 +
|  style="background:orange" | second-preimage || hash || all ||  || 1 || - || [http://ehash.iaik.tugraz.at/uploads/5/5c/Thandra_Khichidi.pdf Thandra]
 +
|-                           
 +
|}                   
 +
 
 +
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].
 +
 
 +
 
 +
<bibtex>
 +
@misc{Khichid1M08,
 +
  author    = {Nicky Mouha},
 +
  title    = {Collision for Khichidi-1},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/8/89/Khichidi-1.txt},
 +
  howpublished = {NIST mailing list (local link)},
 +
  year = {2008},
 +
 
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@misc{Khichid1T09,
 +
  author    = {Prasanth Thandra},
 +
  title    = {Huge 2ndpreimages and collisions of  khichidi-1},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/5/5c/Thandra_Khichidi.pdf},
 +
  howpublished = {Available online},
 +
  year = {2009},
 +
}
 +
</bibtex>

Latest revision as of 09:18, 9 January 2009

1 The algorithm

  • Author(s): Natarajan Vijayarangan
  • NIST submission package: Khichidi-1.zip


Natarajan Vijayarangan - A NEW HASH ALGORITHM: Khichidi-1

,2008
http://ehash.iaik.tugraz.at/uploads/d/d4/Khichidi-1.pdf
Bibtex
Author : Natarajan Vijayarangan
Title : A NEW HASH ALGORITHM: Khichidi-1
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash 256 example - Mouha
collision hash all 1 - Thandra
second-preimage hash all 1 - Thandra

A description of this table is given here.


Nicky Mouha - Collision for Khichidi-1

,2008
http://ehash.iaik.tugraz.at/uploads/8/89/Khichidi-1.txt
Bibtex
Author : Nicky Mouha
Title : Collision for Khichidi-1
In : -
Address :
Date : 2008

Prasanth Thandra - Huge 2ndpreimages and collisions of khichidi-1

,2009
http://ehash.iaik.tugraz.at/uploads/5/5c/Thandra_Khichidi.pdf
Bibtex
Author : Prasanth Thandra
Title : Huge 2ndpreimages and collisions of khichidi-1
In : -
Address :
Date : 2009