Difference between revisions of "LUX"

From The ECRYPT Hash Function Website
(Cryptanalysis of the Hash Function LUX-256)
(Peyrin's slide attack on LUX)
Line 30: Line 30:
 
   year      = {2008},
 
   year      = {2008},
 
   abstract  = {LUX is a new hash function submitted to NIST's SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector. We also give reduced blank round collision attack, free-start collision attack and free-start preimage attack on LUX-256. The two collision attacks are trivial. The free-start preimage attack has complexity of about 2^{80} and requires negligible memory.},
 
   abstract  = {LUX is a new hash function submitted to NIST's SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector. We also give reduced blank round collision attack, free-start collision attack and free-start preimage attack on LUX-256. The two collision attacks are trivial. The free-start preimage attack has complexity of about 2^{80} and requires negligible memory.},
 +
}
 +
</bibtex>
 +
 +
 +
<bibtex>
 +
@misc{luxP08,
 +
  author    = {Thomas Peyrin},
 +
  title    = {Slide attacks on LUX},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/6/62/Lux_peyrin.txt},
 +
  howpublished = {NIST mailing list (local link)},
 +
  year = {2008},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 18:09, 22 December 2008

1 The algorithm

  • Author(s): Ivica Nikolić, Alex Biryukov, and Dmitry Khovratovich
  • NIST submission package: LUX.zip


Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich - Hash family LUX - Algorithm Specifications and

Supporting Documentation

,2008
http://ehash.iaik.tugraz.at/uploads/f/f3/LUX.pdf
Bibtex
Author : Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich
Title : Hash family LUX - Algorithm Specifications and Supporting Documentation
In : -
Address :
Date : 2008


2 Cryptanalysis

Shuang Wu, Dengguo Feng, Wenling Wu - Cryptanalysis of the Hash Function LUX-256

,2008
http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf
Bibtex
Author : Shuang Wu, Dengguo Feng, Wenling Wu
Title : Cryptanalysis of the Hash Function LUX-256
In : -
Address :
Date : 2008


Thomas Peyrin - Slide attacks on LUX

,2008
http://ehash.iaik.tugraz.at/uploads/6/62/Lux_peyrin.txt
Bibtex
Author : Thomas Peyrin
Title : Slide attacks on LUX
In : -
Address :
Date : 2008