Difference between revisions of "NaSHA"
From The ECRYPT Hash Function Website
(Free-start attacks on NaSHA) |
|||
Line 17: | Line 17: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
− | + | ||
+ | <bibtex> | ||
+ | @misc{nashaNK08, | ||
+ | author = {Ivica Nikolić and Dmitry Khovratovich}, | ||
+ | title = {Free-start attacks on NaSHA}, | ||
+ | url = {}, | ||
+ | howpublished = {Available online}, | ||
+ | year = {2008}, | ||
+ | abstract = {We present a free-start collision and a free-start preimage | ||
+ | attack on NaSHA. The attacks exploit the fact that when the state, obtained | ||
+ | after the linear transformation, is only partially �xed then the | ||
+ | quasigroup operations are fully determined. The free-start collision attack | ||
+ | requires $2^{32}$ computations for all digests. The free-start preimage | ||
+ | attack requires around $2^{n/2}$ for NaSHA-n1. The attacks show a weakness | ||
+ | in the compression function of NaSHA, yet they do not contradict the | ||
+ | NIST security requirements.}, | ||
+ | } | ||
+ | </bibtex> |
Revision as of 13:53, 3 December 2008
1 The algorithm
- Author(s): Smile Markovski, Aleksandra Mileva
- Website: http://inf.ugd.edu.mk/images/stories/file/Mileva/Nasha.htm
- Specification:
Smile Markovski, Aleksandra Mileva - 2.B.1 Algorithm Specification
- ,2008
- http://inf.ugd.edu.mk/images/stories/file/Mileva/part2b1.pdf
BibtexAuthor : Smile Markovski, Aleksandra Mileva
Title : 2.B.1 Algorithm Specification
In : -
Address :
Date : 2008
2 Cryptanalysis
Ivica Nikolić, Dmitry Khovratovich - Free-start attacks on NaSHA