Difference between revisions of "SHAMATA"

From The ECRYPT Hash Function Website
(Improved Cryptanalysis of SHAMATA-BC)
Line 25: Line 25:
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   year      = {2008},
 
   year      = {2008},
 +
  abstract = {In this note we discuss some observation of the SHA-3 candidate SHAMATA [1]. We ob-
 +
serve that its internal block cipher is very weak, which could possibly lead to an attack on the hash
 +
function.},
 +
}
 +
</bibtex>
 +
 +
 +
<bibtex>
 +
@misc{shamataAKK08,
 +
  author    = {Adem Atalay and Orhun Kara and Ferhat Karakoc},
 +
  title    = {Improved Cryptanalysis of SHAMATA-BC},
 +
  url        = {http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/improved_analysis_of_Shamata-BC.pdf},
 +
  howpublished = {Available online},
 +
  year      = {2008},
 +
  abstract = {We state the design flaws of the 1-round block cipher SHA-
 +
MATA-BC, designed by Fleishmann and Gorski by using the building
 +
blocks of SHAMATA hash function. We fix the flaws and then show that
 +
the amended version of SHAMATA-BC is much weaker. We believe that
 +
there is no connection between security level of SHAMATA as a hash
 +
function and that of SHAMATA-BC as a block cipher},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 15:48, 1 December 2008