Difference between revisions of "Twister"

From The ECRYPT Hash Function Website
(updated results)
m
Line 27: Line 27:
 
| style="background:greenyellow" | collision || hash || 512 ||  || 2<sup>252</sup> || 2<sup>9</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 
| style="background:greenyellow" | collision || hash || 512 ||  || 2<sup>252</sup> || 2<sup>9</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 
|-                     
 
|-                     
|  style="background:orange" | collision || hash || 512 ||  || 2<sup>384+s</sup> || 2<sup>64-s</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
+
|  style="background:orange" | 2nd preimage || hash || 512 ||  || 2<sup>384+s</sup> || 2<sup>64-s</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 
|-                     
 
|-                     
|  style="background:orange" | 2nd preimage || hash || 512 ||  || 2<sup>456</sup> || 2<sup>10</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
+
|  style="background:orange" | preimage || hash || 512 ||  || 2<sup>456</sup> || 2<sup>10</sup> || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845 Mendel,Rechberger,Schläffer]
 
|-
 
|-
 
|}
 
|}

Revision as of 13:15, 25 March 2009

1 The algorithm


Ewan Fleischmann, Christian Forler, Michael Gorski - The Twister Hash Function Family

,2008
http://ehash.iaik.tugraz.at/uploads/3/39/Twister.pdf
Bibtex
Author : Ewan Fleischmann, Christian Forler, Michael Gorski
Title : The Twister Hash Function Family
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
pseudo-collision compression all 28 - Mendel,Rechberger,Schläffer
collision hash 512 2252 29 Mendel,Rechberger,Schläffer
2nd preimage hash 512 2384+s 264-s Mendel,Rechberger,Schläffer
preimage hash 512 2456 210 Mendel,Rechberger,Schläffer

A description of this table is given here.


Florian Mendel, Christian Rechberger, Martin Schläffer - Cryptanalysis of Twister

,2009
http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=98257&pCurrPk=42845
Bibtex
Author : Florian Mendel, Christian Rechberger, Martin Schläffer
Title : Cryptanalysis of Twister
In : -
Address :
Date : 2009


2.1 Archive

Florian Mendel, Christian Rechberger, Martin Schläffer - Cryptanalysis of Twister

,2008
http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf
Bibtex
Author : Florian Mendel, Christian Rechberger, Martin Schläffer
Title : Cryptanalysis of Twister
In : -
Address :
Date : 2008