Difference between revisions of "Vortex (SHA-3 submission)"

From The ECRYPT Hash Function Website
(note on Vortex' security)
(added abstract)
Line 37: Line 37:
 
   howpublished = {Available online},
 
   howpublished = {Available online},
 
   year      = {2008},
 
   year      = {2008},
 +
  abstract = {Vortex is a hash function based on the AES that was presented at
 +
ISC’2008, and submitted to the NIST SHA-3 competition after some modifications
 +
that aim to strengthen it. This note first shows that the original Vortex is not
 +
collision-resistant, by describing an attack running in about 2^{58} compressions, in-
 +
stead of $2^{128}$ ideally. In the new version submitted to NIST, we present several prop-
 +
erties that seem to render it unsuitable for the new hash standard. In particular,
 +
both versions of Vortex have the undesirable property of impossible images, which
 +
gives distinguishers for a HMAC based on Vortex and slightly speeds up preimage
 +
search.},
 
}
 
}
 
</bibtex>
 
</bibtex>

Revision as of 10:02, 5 December 2008