Difference between revisions of "DHA-256"

From The ECRYPT Hash Function Website
(Others)
Line 45: Line 45:
  
 
=== Others ===
 
=== Others ===
 +
@misc{cryptoeprint:2005:398,
 +
    author = {IAIK Krypto Group},
 +
    title = {Preliminary Analysis of DHA-256},
 +
    howpublished = {Cryptology ePrint Archive, Report 2005/398},
 +
    year = {2005},
 +
    abstract = {DHA-256 was presented at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 (Double Hash Algorithm) was proposed to enhance the security of SHA-256. We present a preliminary analysis of the message expansion and give an alternative 9-step local collision for DHA-256. },
 +
    note = {\url{http://eprint.iacr.org/}},
 +
}

Revision as of 11:34, 3 November 2008

1 Specification

  • digest size: 256 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 256-bit chaining variable

Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong - A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256

,2005
http://csrc.nist.gov/groups/ST/hash/documents/ChangD_DHA256.pdf
Bibtex
Author : Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong
Title : A New 256-bit Hash Function DHA-256 - Enhancing the Security of SHA-256
In : -
Address :
Date : 2005

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others

@misc{cryptoeprint:2005:398,

   author = {IAIK Krypto Group},
   title = {Preliminary Analysis of DHA-256},
   howpublished = {Cryptology ePrint Archive, Report 2005/398},
   year = {2005},
   abstract = {DHA-256 was presented at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 (Double Hash Algorithm) was proposed to enhance the security of SHA-256. We present a preliminary analysis of the message expansion and give an alternative 9-step local collision for DHA-256. },
   note = {\url{http://eprint.iacr.org/}},

}