Difference between revisions of "Tiger"

From The ECRYPT Hash Function Website
Line 1: Line 1:
 
== Spezification ==
 
== Spezification ==
  
<!--
+
 
* digest size: 160 bits
+
* digest size: 192/160/128 bits
 
* max. message length: < 2<sup>64</sup> bits
 
* max. message length: < 2<sup>64</sup> bits
* compression function: 512-bit message block, 160-bit chaining variable
+
* compression function: 512-bit message block, 192-bit chaining variable
 
* Specification:  
 
* Specification:  
-->
+
 
  
 
== Cryptanalysis ==
 
== Cryptanalysis ==

Revision as of 14:18, 7 March 2008

1 Spezification

  • digest size: 192/160/128 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 192-bit chaining variable
  • Specification:


2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks


2.3 Collision Attacks


2.4 Second Preimage Attacks


2.5 Preimage Attacks


2.6 Others