Difference between revisions of "Maraca"
From The ECRYPT Hash Function Website
(14 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
== The algorithm == | == The algorithm == | ||
− | * | + | * Author(s): Robert J. Jenkins Jr. |
− | * | + | * Website: [http://burtleburtle.net/bob/crypto/maraca/nist/ http://burtleburtle.net/bob/crypto/maraca/nist/] |
− | + | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3Jenkins08, | ||
+ | author = {Robert J. Jenkins Jr.}, | ||
+ | title = {Algorithm Specification}, | ||
+ | url = http://burtleburtle.net/bob/crypto/maraca/nist/Supporting_Documentation/specification.pdf}, | ||
+ | howpublished = {Submission to NIST}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | |
+ | |- style="background:#efefef;" | ||
+ | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | | style="background:yellow" | collision || internal state || 512 || || 2<sup>237</sup> || 2<sup>230.5</sup> || [http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf Canteaut,Naya-Plasencia] | ||
+ | |- | ||
+ | | style="background:red" | preimage|| hash || 512 || || ? || ? || [http://homes.esat.kuleuven.be/~sindeste/maraca.html Indesteege] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{maracaCN08, | ||
+ | author = {Anne Canteaut and María Naya-Plasencia}, | ||
+ | title = {Internal collision attack on Maraca}, | ||
+ | url = {http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf}, | ||
+ | howpublished = {Available online}, | ||
+ | year = {2008}, | ||
+ | abstract = {We present an internal collision attack against the new hash | ||
+ | function Maraca which has been submitted to the SHA-3 competition. | ||
+ | This attack requires 2^{237} calls to the round function and its complexity is | ||
+ | lower than the complexity of the generic collision attack when the length | ||
+ | of the message digest is greater than or equal to 512. The cryptanalysis | ||
+ | mainly exploits two features of Maraca: the fact that the message block | ||
+ | inserted at each round has the same size as the internal state, and some | ||
+ | particular differential properties of the inner permutation.}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{maracaI09, | ||
+ | author = {Sebastiaan Indesteege}, | ||
+ | title = {Practical Preimages for Maraca}, | ||
+ | url = {http://homes.esat.kuleuven.be/~sindeste/maraca.html}, | ||
+ | howpublished = {Available online}, | ||
+ | year = {2009}, | ||
+ | abstract = {We show a practical (seconds on a PC) preimage attack on the hash function Maraca.}, | ||
+ | } | ||
+ | </bibtex> |
Latest revision as of 18:58, 17 May 2011
1 The algorithm
- Author(s): Robert J. Jenkins Jr.
- Website: http://burtleburtle.net/bob/crypto/maraca/nist/
Robert J. Jenkins Jr. - Algorithm Specification
- ,2008
- @http://burtleburtle.net/bob/crypto/maraca/nist/Supporting_Documentation/specification.pdf
BibtexAuthor : Robert J. Jenkins Jr.
Title : Algorithm Specification
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
collision | internal state | 512 | 2237 | 2230.5 | Canteaut,Naya-Plasencia | |
preimage | hash | 512 | ? | ? | Indesteege |
A description of this table is given here.
Anne Canteaut, María Naya-Plasencia - Internal collision attack on Maraca
- ,2008
- http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf
BibtexAuthor : Anne Canteaut, María Naya-Plasencia
Title : Internal collision attack on Maraca
In : -
Address :
Date : 2008
Sebastiaan Indesteege - Practical Preimages for Maraca