# Difference between revisions of "Hamsi"

## 1 The algorithm

Özgül Kücük - The Hash Function Hamsi

,2009
http://www.cosic.esat.kuleuven.be/publications/article-1203.pdf
Bibtex
Author : Özgül Kücük
Title : The Hash Function Hamsi
In : -
Date : 2009

Özgül Kücük - The Hash Function Hamsi

,2008
Bibtex
Author : Özgül Kücük
Title : The Hash Function Hamsi
In : -
Date : 2008

## 2 Cryptanalysis

We distinguish between two cases: results on the complete hash function, and results on underlying building blocks.

A description of the tables is given here.

Recommended security parameters: (3,6) P,Pf rounds (n=224,256); (6,12) P,Pf rounds (n=384,512).

### 2.1 Hash function

Here we list results on the actual hash function. The only allowed modification is to change the security parameter.

 Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference

### 2.2 Building blocks

Here we list results on underlying building blocks, and the hash function modified by other means than the security parameter.

Note that these results assume more direct control or access over some internal variables (aka. free-start, pseudo, compression function, block cipher, or permutation attacks).

 Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference non-randomness compression function 224, 256 5 rounds Aumasson near-collision compression function 224, 256 3 rounds 221 Nikolic distinguisher compression function 224, 256 6 rounds 227 Aumasson,Meier distinguisher compression function 384, 512 12 rounds 2729 Aumasson,Meier near-collision compression function 224, 256 3 rounds 25 Wang,Wang,Jia,Wang near-collision compression function 224, 256 4 rounds 232 Wang,Wang,Jia,Wang near-collision compression function 224, 256 5 rounds 2125 Wang,Wang,Jia,Wang message-recovery compression function 224, 256 3 rounds 210.48 Calik,Turan pseudo-2nd-preimage hash function 256 (3,6) rounds 2254.25 Calik,Turan

Jean-Philippe Aumasson - On the pseudorandomness of Hamsi

,2009
Bibtex
Author : Jean-Philippe Aumasson
Title : On the pseudorandomness of Hamsi
In : -
Date : 2009

Ivica Nikolic - Near Collisions for the Compression Function of Hamsi-256

,2009
http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf
Bibtex
Author : Ivica Nikolic
Title : Near Collisions for the Compression Function of Hamsi-256
In : -
Date : 2009

Jean-Philippe Aumasson, Willi Meier - Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi

,2009
http://www.131002.net/data/papers/AM09.pdf
Bibtex
Author : Jean-Philippe Aumasson, Willi Meier
Title : Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi
In : -
Date : 2009

Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang - New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256

,2009
http://eprint.iacr.org/2009/484.pdf
Bibtex
Author : Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
Title : New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
In : -