Difference between revisions of "NKS2D"

From The ECRYPT Hash Function Website
(The algorithm)
m
 
(4 intermediate revisions by 2 users not shown)
Line 3: Line 3:
 
* Author(s): Geoffrey Park
 
* Author(s): Geoffrey Park
 
* Website: [http://geoffrey.park.googlepages.com/home http://geoffrey.park.googlepages.com/home]  
 
* Website: [http://geoffrey.park.googlepages.com/home http://geoffrey.park.googlepages.com/home]  
* Specification:
+
 
  
 
<bibtex>
 
<bibtex>
Line 14: Line 14:
 
}
 
}
 
</bibtex>
 
</bibtex>
 +
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
* None yet
+
{| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center"                 
 +
|- style="background:#efefef;"                 
 +
|  Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||  Reference
 +
|-                                       
 +
|  style="background:red" | collision || hash || 224 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt De Cannière]
 +
|-                   
 +
| style="background:red" | collision || hash || 512 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt Enright]
 +
|-                                   
 +
|}                   
 +
 
 +
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].
 +
 
 +
 
 +
<bibtex>
 +
@misc{nks2dC08,
 +
  author    = {Christophe De Cannière},
 +
  title    = {Collisions for NKS2D-224},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt},
 +
  howpublished = {NIST mailing list (local link)},
 +
  year = {2008},
 +
 
 +
}
 +
</bibtex>
 +
 
 +
<bibtex>
 +
@misc{nks2dE08,
 +
  author    = {Brandon Enright},
 +
  title    = {Collisions for NKS2D-512},
 +
  url = {http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt},
 +
  howpublished = {NIST mailing list (local link)},
 +
  year = {2008},
 +
 
 +
}
 +
</bibtex>

Latest revision as of 22:01, 29 December 2008

1 The algorithm


Geoffrey Park - NKS 2D Cellular Automata Hash

,2008
http://geoffrey.park.googlepages.com/SHA3Submission01.pdf
Bibtex
Author : Geoffrey Park
Title : NKS 2D Cellular Automata Hash
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision hash 224 example - De Cannière
collision hash 512 example - Enright

A description of this table is given here.


Christophe De Cannière - Collisions for NKS2D-224

,2008
http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt
Bibtex
Author : Christophe De Cannière
Title : Collisions for NKS2D-224
In : -
Address :
Date : 2008

Brandon Enright - Collisions for NKS2D-512

,2008
http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt
Bibtex
Author : Brandon Enright
Title : Collisions for NKS2D-512
In : -
Address :
Date : 2008