Difference between revisions of "SHA-512/384"

From The ECRYPT Hash Function Website
(Collision Attacks)
(Specification)
Line 1: Line 1:
 
== Specification ==
 
== Specification ==
  
* digest size: 512 bits
+
* digest size: 512 bits, truncation to 384 bits also specified
 
* max. message length: < 2<sup>128</sup> bits
 
* max. message length: < 2<sup>128</sup> bits
 
* compression function: 1024-bit message block, 512-bit chaining variable
 
* compression function: 1024-bit message block, 512-bit chaining variable

Revision as of 10:56, 17 March 2008

1 Specification

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks

Henri Gilbert, Helena Handschuh - Security Analysis of SHA-256 and Sisters

Selected Areas in Cryptography 3006:175-193,2003
http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3006{\&}spage=175
Bibtex
Author : Henri Gilbert, Helena Handschuh
Title : Security Analysis of SHA-256 and Sisters
In : Selected Areas in Cryptography -
Address :
Date : 2003

2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others