Difference between revisions of "Maraca"

From The ECRYPT Hash Function Website
 
 
(14 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 
== The algorithm ==
 
== The algorithm ==
  
* Website:  
+
* Author(s): Robert J. Jenkins Jr.
* Author:
+
* Website: [http://burtleburtle.net/bob/crypto/maraca/nist/ http://burtleburtle.net/bob/crypto/maraca/nist/]
* Specification:
+
 
 +
 
 +
<bibtex>
 +
@misc{sha3Jenkins08,
 +
  author    = {Robert J. Jenkins Jr.},
 +
  title    = {Algorithm Specification},
 +
  url      = http://burtleburtle.net/bob/crypto/maraca/nist/Supporting_Documentation/specification.pdf},
 +
  howpublished = {Submission to NIST},
 +
  year      = {2008},
 +
}
 +
</bibtex>
 +
 
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==
  
* None yet
+
{| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center"                 
 +
|- style="background:#efefef;"                 
 +
|    Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||  Reference
 +
|-                                       
 +
|  style="background:yellow" | collision || internal state || 512 ||  || 2<sup>237</sup> || 2<sup>230.5</sup> || [http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf Canteaut,Naya-Plasencia]
 +
|- 
 +
|  style="background:red" | preimage|| hash || 512 ||  || ? || ? || [http://homes.esat.kuleuven.be/~sindeste/maraca.html Indesteege]
 +
|-                                   
 +
|}                   
 +
 
 +
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].
 +
 
 +
 
 +
<bibtex>
 +
@misc{maracaCN08,
 +
author = {Anne Canteaut and María Naya-Plasencia},
 +
title = {Internal collision attack on Maraca},
 +
url = {http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf},
 +
howpublished = {Available online},
 +
year = {2008},
 +
abstract = {We present an internal collision attack against the new hash
 +
function Maraca which has been submitted to the SHA-3 competition.
 +
This attack requires 2^{237} calls to the round function and its complexity is
 +
lower than the complexity of the generic collision attack when the length
 +
of the message digest is greater than or equal to 512. The cryptanalysis
 +
mainly exploits two features of Maraca: the fact that the message block
 +
inserted at each round has the same size as the internal state, and some
 +
particular differential properties of the inner permutation.},
 +
}
 +
</bibtex>
 +
 
 +
 
 +
<bibtex>
 +
@misc{maracaI09,
 +
author = {Sebastiaan Indesteege},
 +
title = {Practical Preimages for Maraca},
 +
url = {http://homes.esat.kuleuven.be/~sindeste/maraca.html},
 +
howpublished = {Available online},
 +
year = {2009},
 +
abstract = {We show a practical (seconds on a PC) preimage attack on the hash function Maraca.},
 +
}
 +
</bibtex>

Latest revision as of 17:58, 17 May 2011

1 The algorithm


Robert J. Jenkins Jr. - Algorithm Specification

,2008
@http://burtleburtle.net/bob/crypto/maraca/nist/Supporting_Documentation/specification.pdf
Bibtex
Author : Robert J. Jenkins Jr.
Title : Algorithm Specification
In : -
Address :
Date : 2008


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
collision internal state 512 2237 2230.5 Canteaut,Naya-Plasencia
preimage hash 512 ? ? Indesteege

A description of this table is given here.


Anne Canteaut, María Naya-Plasencia - Internal collision attack on Maraca

,2008
http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf
Bibtex
Author : Anne Canteaut, María Naya-Plasencia
Title : Internal collision attack on Maraca
In : -
Address :
Date : 2008


Sebastiaan Indesteege - Practical Preimages for Maraca

,2009
http://homes.esat.kuleuven.be/~sindeste/maraca.html
Bibtex
Author : Sebastiaan Indesteege
Title : Practical Preimages for Maraca
In : -
Address :
Date : 2009