Difference between revisions of "NKS2D"
From The ECRYPT Hash Function Website
m |
|||
(8 intermediate revisions by 3 users not shown) | |||
Line 3: | Line 3: | ||
* Author(s): Geoffrey Park | * Author(s): Geoffrey Park | ||
* Website: [http://geoffrey.park.googlepages.com/home http://geoffrey.park.googlepages.com/home] | * Website: [http://geoffrey.park.googlepages.com/home http://geoffrey.park.googlepages.com/home] | ||
− | + | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{sha3Park08, | ||
+ | author = {Geoffrey Park}, | ||
+ | title = {NKS 2D Cellular Automata Hash}, | ||
+ | url = {http://geoffrey.park.googlepages.com/SHA3Submission01.pdf}, | ||
+ | howpublished = {Submission to NIST}, | ||
+ | year = {2008}, | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | |
+ | |- style="background:#efefef;" | ||
+ | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
+ | |- | ||
+ | | style="background:red" | collision || hash || 224 || || example || - || [http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt De Cannière] | ||
+ | |- | ||
+ | | style="background:red" | collision || hash || 512 || || example || - || [http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt Enright] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
+ | |||
+ | |||
+ | <bibtex> | ||
+ | @misc{nks2dC08, | ||
+ | author = {Christophe De Cannière}, | ||
+ | title = {Collisions for NKS2D-224}, | ||
+ | url = {http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt}, | ||
+ | howpublished = {NIST mailing list (local link)}, | ||
+ | year = {2008}, | ||
+ | |||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{nks2dE08, | ||
+ | author = {Brandon Enright}, | ||
+ | title = {Collisions for NKS2D-512}, | ||
+ | url = {http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt}, | ||
+ | howpublished = {NIST mailing list (local link)}, | ||
+ | year = {2008}, | ||
+ | |||
+ | } | ||
+ | </bibtex> |
Latest revision as of 22:01, 29 December 2008
1 The algorithm
- Author(s): Geoffrey Park
- Website: http://geoffrey.park.googlepages.com/home
Geoffrey Park - NKS 2D Cellular Automata Hash
- ,2008
- http://geoffrey.park.googlepages.com/SHA3Submission01.pdf
BibtexAuthor : Geoffrey Park
Title : NKS 2D Cellular Automata Hash
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
collision | hash | 224 | example | - | De Cannière | |
collision | hash | 512 | example | - | Enright |
A description of this table is given here.
Christophe De Cannière - Collisions for NKS2D-224
- ,2008
- http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt
BibtexAuthor : Christophe De Cannière
Title : Collisions for NKS2D-224
In : -
Address :
Date : 2008
Brandon Enright - Collisions for NKS2D-512