Difference between revisions of "Shabal"
From The ECRYPT Hash Function Website
m |
(Added official comment on Shabal) |
||
Line 24: | Line 24: | ||
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
|- | |- | ||
− | | | non-randomness || permutation || all || || 2<sup>12</sup> || | + | | | non-randomness || permutation || all || || 2<sup>12</sup> || (p,r)=(3,12) || [http://131002.net/data/papers/Aum09.pdf Aumasson] |
− | |||
− | |||
|- | |- | ||
+ | | | non-randomness || permutation || all || || 1 || any (p,r) || [http://www.mat.dtu.dk/people/S.Thomsen/shabal/shabal.pdf Knudsen,Matusiewicz,Thomsen] | ||
+ | |- | ||
+ | | | non-randomness || permutation || all || || 1 || any (p,r) || [http://131002.net/data/papers/AMM09.pdf Aumasson,Mashatan,Meier] | ||
+ | |- | ||
|} | |} | ||
Line 63: | Line 65: | ||
choice of security parameters. Our observations, on the other hand, do not seem extensible | choice of security parameters. Our observations, on the other hand, do not seem extensible | ||
to the full hash function. | to the full hash function. | ||
+ | } | ||
+ | </bibtex> | ||
+ | |||
+ | <bibtex> | ||
+ | @misc{shabalAum09a, | ||
+ | author = {Jean-Philippe Aumasson and Atefeh Mashatan and Willi Meier}, | ||
+ | title = {More on Shabal's permutation}, | ||
+ | url = {http://131002.net/data/papers/AMM09.pdf}, | ||
+ | howpublished = {OFFICIAL COMMENT}, | ||
+ | year = {2009}, | ||
} | } | ||
</bibtex> | </bibtex> |
Revision as of 10:18, 15 April 2009
1 The algorithm
- Author(s): Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau
- Website: http://www.shabal.com/
- NIST submission package: Shabal.zip
Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau - Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition
- ,2008
- http://ehash.iaik.tugraz.at/uploads/6/6c/Shabal.pdf
BibtexAuthor : Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau
Title : Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
non-randomness | permutation | all | 212 | (p,r)=(3,12) | Aumasson | |
non-randomness | permutation | all | 1 | any (p,r) | Knudsen,Matusiewicz,Thomsen | |
non-randomness | permutation | all | 1 | any (p,r) | Aumasson,Mashatan,Meier |
A description of this table is given here.
Jean-Philippe Aumasson - On the pseudorandomness of Shabal's keyed permutation
- ,2009
- http://131002.net/data/papers/Aum09.pdf
BibtexAuthor : Jean-Philippe Aumasson
Title : On the pseudorandomness of Shabal's keyed permutation
In : -
Address :
Date : 2009
Lars R. Knudsen, Krystian Matusiewicz, Søren S. Thomsen - Observations on the Shabal keyed permutation
- ,2009
- http://www.mat.dtu.dk/people/S.Thomsen/shabal/shabal.pdf
BibtexAuthor : Lars R. Knudsen, Krystian Matusiewicz, Søren S. Thomsen
Title : Observations on the Shabal keyed permutation
In : -
Address :
Date : 2009
Jean-Philippe Aumasson, Atefeh Mashatan, Willi Meier - More on Shabal's permutation