Difference between revisions of "Shabal"
From The ECRYPT Hash Function Website
(Added official comment on Shabal) |
m (fixed typo in table) |
||
Line 24: | Line 24: | ||
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
|- | |- | ||
− | | | non-randomness || permutation || all || | + | | | non-randomness || permutation || all || (p,r)=(3,12) || 2<sup>12</sup> || || [http://131002.net/data/papers/Aum09.pdf Aumasson] |
|- | |- | ||
− | | | non-randomness || permutation || all || | + | | | non-randomness || permutation || all || any (p,r) || 1 || || [http://www.mat.dtu.dk/people/S.Thomsen/shabal/shabal.pdf Knudsen,Matusiewicz,Thomsen] |
|- | |- | ||
− | | | non-randomness || permutation || all | + | | | non-randomness || permutation || all || any (p,r) || 1 || || [http://131002.net/data/papers/AMM09.pdf Aumasson,Mashatan,Meier] |
|- | |- | ||
|} | |} |
Revision as of 16:19, 15 April 2009
1 The algorithm
- Author(s): Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau
- Website: http://www.shabal.com/
- NIST submission package: Shabal.zip
Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau - Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition
- ,2008
- http://ehash.iaik.tugraz.at/uploads/6/6c/Shabal.pdf
BibtexAuthor : Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau
Title : Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
non-randomness | permutation | all | (p,r)=(3,12) | 212 | Aumasson | |
non-randomness | permutation | all | any (p,r) | 1 | Knudsen,Matusiewicz,Thomsen | |
non-randomness | permutation | all | any (p,r) | 1 | Aumasson,Mashatan,Meier |
A description of this table is given here.
Jean-Philippe Aumasson - On the pseudorandomness of Shabal's keyed permutation
- ,2009
- http://131002.net/data/papers/Aum09.pdf
BibtexAuthor : Jean-Philippe Aumasson
Title : On the pseudorandomness of Shabal's keyed permutation
In : -
Address :
Date : 2009
Lars R. Knudsen, Krystian Matusiewicz, Søren S. Thomsen - Observations on the Shabal keyed permutation
- ,2009
- http://www.mat.dtu.dk/people/S.Thomsen/shabal/shabal.pdf
BibtexAuthor : Lars R. Knudsen, Krystian Matusiewicz, Søren S. Thomsen
Title : Observations on the Shabal keyed permutation
In : -
Address :
Date : 2009
Jean-Philippe Aumasson, Atefeh Mashatan, Willi Meier - More on Shabal's permutation