Difference between revisions of "SHAMATA"

From The ECRYPT Hash Function Website
m (Typo fixed)
m (idem...)
Line 27: Line 27:
 
|  | observation || block cipher ||  ||  ||  ||  || [http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/improved_analysis_of_Shamata-BC.pdf Atalay,Kara,Karakoc]
 
|  | observation || block cipher ||  ||  ||  ||  || [http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/improved_analysis_of_Shamata-BC.pdf Atalay,Kara,Karakoc]
 
|-
 
|-
| style="background:yellow" | second preimage || hash || 512 ||  || 2<sup>451.7</sup> || 2<sup>452.7</sup> || [http://www.sdl.hitachi.co.jp/crypto/eval/shamata_2ndPI.pdf Ideguchi,Watanabe]
+
| style="background:yellow" | 2nd preimage || hash || 512 ||  || 2<sup>451.7</sup> || 2<sup>452.7</sup> || [http://www.sdl.hitachi.co.jp/crypto/eval/shamata_2ndPI.pdf Ideguchi,Watanabe]
 
|-                                       
 
|-                                       
 
|}                     
 
|}                     

Revision as of 08:59, 21 February 2009

1 The algorithm


Adem Atalay, Orhun Kara, Ferhat Karakoc, Cevat Manap - SHAMATA HASH FUNCTION ALGORITHM SPECIFICATIONS

,2008
http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/SHAMATA%20Specification.pdf
Bibtex
Author : Adem Atalay, Orhun Kara, Ferhat Karakoc, Cevat Manap
Title : SHAMATA HASH FUNCTION ALGORITHM SPECIFICATIONS
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
observation block cipher Fleischmann,Gorski
observation block cipher Atalay,Kara,Karakoc
2nd preimage hash 512 2451.7 2452.7 Ideguchi,Watanabe

A description of this table is given here.


Ewan Fleischmann, Michael Gorski - Some Observations on SHAMATA

,2008
http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Observations_for_SHAMATA.pdf
Bibtex
Author : Ewan Fleischmann, Michael Gorski
Title : Some Observations on SHAMATA
In : -
Address :
Date : 2008

Adem Atalay, Orhun Kara, Ferhat Karakoc - Improved Cryptanalysis of SHAMATA-BC

,2008
http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/improved_analysis_of_Shamata-BC.pdf
Bibtex
Author : Adem Atalay, Orhun Kara, Ferhat Karakoc
Title : Improved Cryptanalysis of SHAMATA-BC
In : -
Address :
Date : 2008

Kota Ideguchi, Dai Watanabe - Second Preimage Attack on SHAMATA-512

,2009
http://www.sdl.hitachi.co.jp/crypto/eval/shamata_2ndPI.pdf
Bibtex
Author : Kota Ideguchi, Dai Watanabe
Title : Second Preimage Attack on SHAMATA-512
In : -
Address :
Date : 2009