Vortex

From The ECRYPT Hash Function Website
Revision as of 14:50, 30 July 2009 by Crechberger (talk | contribs) (Update on Vortex)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

1 Specification

  • digest size: 256 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 256-bit chaining variable
  • Specification:

Shay Gueron, Michael E. Kounavis - Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication

ISC 5222:331-340,2008
http://dx.doi.org/10.1007/978-3-540-85886-7_23
Bibtex
Author : Shay Gueron, Michael E. Kounavis
Title : Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
In : ISC -
Address :
Date : 2008

2 Cryptanalysis

2.1 Best Known Results

Collision attacks and distinguishing attacks were found.


2.2 Generic Attacks


2.3 Collision Attacks

A collision attack is described in

Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen - Cryptanalysis of Vortex

AFRICACRYPT 5580:14-28,2009
http://www.131002.net/data/papers/ADMRT09.pdf
Bibtex
Author : Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
Title : Cryptanalysis of Vortex
In : AFRICACRYPT -
Address :
Date : 2009



2.4 Preimage Attacks


2.5 Others

A distinguisher is described in

Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen - Cryptanalysis of Vortex

AFRICACRYPT 5580:14-28,2009
http://www.131002.net/data/papers/ADMRT09.pdf
Bibtex
Author : Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
Title : Cryptanalysis of Vortex
In : AFRICACRYPT -
Address :
Date : 2009