From: Niels Ferguson Date: Wed, 8 Apr 2009 23:03:49 -0400 Subject: RE: OFFICIAL COMMENT: LUX I have not validated this attack, but if I understand the results correctly, LUX-256 can be seen as a 200-bit hash function with a post-processing function that stretches the 200 bits into a 256-bit result. That means it can't be used in SP 800-90 Hash-DRBG, it generates weak keys if used in a normal hash-based KDF, has reduced security for HMAC-LUX, etc. A minor point: We can drop the memory requirements for collision finding from 2100 (2228 for LUX-512) to a constant size by using Floyd's or Brent's cycle finding algorithm. Regards, Niels ________________________________________ From: hash-forum@nist.gov [hash-forum@nist.gov] On Behalf Of Watanabe Dai [dai.watanabe.td@hitachi.com] Sent: Wednesday, April 08, 2009 8:02 PM To: Multiple recipients of list Subject: OFFICIAL COMMENT: LUX Dear all, I looked at Wu et. al's report [1] on LUX and I believe that their observation can obviously be extended to a collision attack and a second preimage attack which would be labeled orange in the SHA-3 zoo according to their computational complexities. The following is the brief sketch of the attacks. == Wu et. al's observation Let H=(h0, h1, ..., h7) be the hash value and hi=(ai, bi, ci, di) be its byte expression. Then the following relation holds for 0