Difference between revisions of "LUX"
From The ECRYPT Hash Function Website
(Peyrin's slide attack on LUX) |
m |
||
Line 21: | Line 21: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
+ | |||
+ | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | ||
+ | |- style="background:#efefef;" | ||
+ | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | | | collision || reduced hash || 224 || 3 blank rounds || - || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu] | ||
+ | |- | ||
+ | | | near-collision || reduced hash || 256 || 3 blank rounds || - || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu] | ||
+ | |- | ||
+ | | | free-start collision || compression || ? || || - || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu] | ||
+ | |- | ||
+ | | | free-start preimage || compression || ? || || 2<sup>80</sup> || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu] | ||
+ | |- | ||
+ | | | slide-attack || hash || all || salt size: 31 mod 32 || - || - || [http://ehash.iaik.tugraz.at/uploads/6/62/Lux_peyrin.txt Peyrin] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
+ | |||
<bibtex> | <bibtex> | ||
Line 32: | Line 51: | ||
} | } | ||
</bibtex> | </bibtex> | ||
− | |||
<bibtex> | <bibtex> |
Revision as of 22:12, 29 December 2008
1 The algorithm
- Author(s): Ivica Nikolić, Alex Biryukov, and Dmitry Khovratovich
- NIST submission package: LUX.zip
Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich - Hash family LUX - Algorithm Specifications and
Supporting Documentation
- ,2008
- http://ehash.iaik.tugraz.at/uploads/f/f3/LUX.pdf
BibtexAuthor : Ivica Nikolić, Alex Biryukov,, Dmitry Khovratovich
Title : Hash family LUX - Algorithm Specifications and Supporting Documentation
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
collision | reduced hash | 224 | 3 blank rounds | - | - | Wu,Feng,Wu |
near-collision | reduced hash | 256 | 3 blank rounds | - | - | Wu,Feng,Wu |
free-start collision | compression | ? | - | - | Wu,Feng,Wu | |
free-start preimage | compression | ? | 280 | - | Wu,Feng,Wu | |
slide-attack | hash | all | salt size: 31 mod 32 | - | - | Peyrin |
A description of this table is given here.
Shuang Wu, Dengguo Feng, Wenling Wu - Cryptanalysis of the Hash Function LUX-256
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf
BibtexAuthor : Shuang Wu, Dengguo Feng, Wenling Wu
Title : Cryptanalysis of the Hash Function LUX-256
In : -
Address :
Date : 2008
Thomas Peyrin - Slide attacks on LUX