Difference between revisions of "LUX"
From The ECRYPT Hash Function Website
(Cryptanalysis of the Hash Function LUX-256) |
(Peyrin's slide attack on LUX) |
||
Line 30: | Line 30: | ||
year = {2008}, | year = {2008}, | ||
abstract = {LUX is a new hash function submitted to NIST's SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector. We also give reduced blank round collision attack, free-start collision attack and free-start preimage attack on LUX-256. The two collision attacks are trivial. The free-start preimage attack has complexity of about 2^{80} and requires negligible memory.}, | abstract = {LUX is a new hash function submitted to NIST's SHA-3 competition. In this paper, we found some non-random properties of LUX due to the weakness of origin shift vector. We also give reduced blank round collision attack, free-start collision attack and free-start preimage attack on LUX-256. The two collision attacks are trivial. The free-start preimage attack has complexity of about 2^{80} and requires negligible memory.}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{luxP08, | ||
+ | author = {Thomas Peyrin}, | ||
+ | title = {Slide attacks on LUX}, | ||
+ | url = {http://ehash.iaik.tugraz.at/uploads/6/62/Lux_peyrin.txt}, | ||
+ | howpublished = {NIST mailing list (local link)}, | ||
+ | year = {2008}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 18:09, 22 December 2008
1 The algorithm
- Author(s): Ivica Nikolić, Alex Biryukov, and Dmitry Khovratovich
- NIST submission package: LUX.zip
Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich - Hash family LUX - Algorithm Specifications and
Supporting Documentation
- ,2008
- http://ehash.iaik.tugraz.at/uploads/f/f3/LUX.pdf
BibtexAuthor : Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich
Title : Hash family LUX - Algorithm Specifications and Supporting Documentation
In : -
Address :
Date : 2008
2 Cryptanalysis
Shuang Wu, Dengguo Feng, Wenling Wu - Cryptanalysis of the Hash Function LUX-256
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf
BibtexAuthor : Shuang Wu, Dengguo Feng, Wenling Wu
Title : Cryptanalysis of the Hash Function LUX-256
In : -
Address :
Date : 2008
Thomas Peyrin - Slide attacks on LUX