<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://ehash.iaik.tugraz.at/api.php?action=feedcontributions&amp;user=GVanAssche&amp;feedformat=atom</id>
	<title>The ECRYPT Hash Function Website - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://ehash.iaik.tugraz.at/api.php?action=feedcontributions&amp;user=GVanAssche&amp;feedformat=atom"/>
	<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/wiki/Special:Contributions/GVanAssche"/>
	<updated>2024-07-08T07:30:58Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.3</generator>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Groestl&amp;diff=3717</id>
		<title>Groestl</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Groestl&amp;diff=3717"/>
		<updated>2011-08-31T09:43:37Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen&lt;br /&gt;
* Website: [http://www.groestl.info http://www.groestl.info]&lt;br /&gt;
* NIST submission package: &lt;br /&gt;
** Round 3: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round3/documents/Groestl_FinalRnd.zip Groestl_FinalRnd.zip]&lt;br /&gt;
** Round 1/2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Grostl_Round2.zip Grostl_Round2.zip] (old version: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Grostl.zip Grostl.zip])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3groestl,&lt;br /&gt;
  author    = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schläffer and Søren S. Thomsen},&lt;br /&gt;
  title     = {Grøstl -- a SHA-3 candidate},&lt;br /&gt;
  url        = {http://www.groestl.info/Groestl.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 3)},&lt;br /&gt;
  year      = {2011},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3groestl,&lt;br /&gt;
  author    = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schläffer and Søren S. Thomsen},&lt;br /&gt;
  title     = {Grøstl Addendum},&lt;br /&gt;
  url        = {http://groestl.info/Groestl-addendum.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 2)},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3groestl,&lt;br /&gt;
  author    = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schläffer and Søren S. Thomsen},&lt;br /&gt;
  title     = {Grøstl -- a SHA-3 candidate},&lt;br /&gt;
  url        = {http://groestl.info/Groestl-0.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 1/2)},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
We distinguish between two cases: results on the complete hash function, and results on underlying building blocks.&lt;br /&gt;
&lt;br /&gt;
A description of the tables is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].&lt;br /&gt;
&lt;br /&gt;
Recommended security parameter: '''10''' rounds (n=224,256); '''14''' rounds (n=384,512)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hash function ===&lt;br /&gt;
&lt;br /&gt;
Here we list results on the hash function according to the NIST requirements. The only allowed modification is to change the security parameter.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
| Type of Analysis || Hash Size (n) || Parameters || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-&lt;br /&gt;
| collision || 224,256 || 3 rounds || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || - || [http://groestl.info/groestl-analysis.pdf Schläffer]&lt;br /&gt;
|-&lt;br /&gt;
| collision || 512 || 3 rounds || 2&amp;lt;sup&amp;gt;192&amp;lt;/sup&amp;gt; || - || [http://groestl.info/groestl-analysis.pdf Schläffer]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Building blocks ===&lt;br /&gt;
&lt;br /&gt;
Here we list results on underlying building blocks, and the hash function modified by other means than the security parameter.&lt;br /&gt;
&lt;br /&gt;
Note that these results assume more direct control or access over some internal variables (aka. free-start, pseudo, compression function, block cipher, or permutation attacks). &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-   &lt;br /&gt;
| distinguisher  || permutation || 256 || 10 rounds || 2&amp;lt;sup&amp;gt;509&amp;lt;/sup&amp;gt; || || [http://fse2011.mat.dtu.dk/slides/Higher-order%20differential%20properties%20of%20Keccak%20and%20Luffa.pdf Boura,Canteaut,DeCannière]&lt;br /&gt;
|-           &lt;br /&gt;
| semi-free-start collision || compression function || 256 || 6 rounds || 2&amp;lt;sup&amp;gt;112&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://groestl.info/groestl-analysis.pdf Schläffer]&lt;br /&gt;
|-&lt;br /&gt;
| semi-free-start collision || compression function || 384,512 || 6 rounds || 2&amp;lt;sup&amp;gt;180&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://groestl.info/groestl-analysis.pdf Schläffer]&lt;br /&gt;
|-&lt;br /&gt;
| collision || hash function || 224,256 || 5 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;48&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;32&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/375.pdf Ideguchi,Tischhauser,Preneel]&lt;br /&gt;
|-&lt;br /&gt;
| collision || hash function || 256 || 6 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;112&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;32&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/375.pdf Ideguchi,Tischhauser,Preneel]&lt;br /&gt;
|-&lt;br /&gt;
| collision || hash function || 224,256 || 4 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| collision || hash function || 224,256 || 3 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || - || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| collision || hash function || 384,512 || 5 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;176&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| collision || hash function || 384,512 || 4 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || compression function || 256 || 10 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;175&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/607.pdf Naya-Plasencia]&lt;br /&gt;
|-&lt;br /&gt;
| distinguisher || compression function || 512 || 11 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;630&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/607.pdf Naya-Plasencia]&lt;br /&gt;
|-&lt;br /&gt;
| distinguisher || permutation || 256 || 8 rounds || 2&amp;lt;sup&amp;gt;48&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;8&amp;lt;/sup&amp;gt; || [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/SASAKI_ECHOanalysisFinal.pdf Sasaki,Li,Wang,Sakiyama,Ohta]&lt;br /&gt;
|-&lt;br /&gt;
| semi-free-start collision || compression function || 512 || 7 rounds || 2&amp;lt;sup&amp;gt;152&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;56&amp;lt;/sup&amp;gt; || [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/SASAKI_ECHOanalysisFinal.pdf Sasaki,Li,Wang,Sakiyama,Ohta]&lt;br /&gt;
|-&lt;br /&gt;
| semi-free-start collision || compression function || 224,256 || 7 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;32&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/375.pdf Ideguchi,Tischhauser,Preneel]&lt;br /&gt;
|-&lt;br /&gt;
| semi-free-start collision || compression function || 224,256 || 8 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;192&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/375.pdf Ideguchi,Tischhauser,Preneel]&lt;br /&gt;
|-&lt;br /&gt;
| distinguisher || permutation || 224,256 || 7 rounds || 2&amp;lt;sup&amp;gt;19&amp;lt;/sup&amp;gt; || - || [http://eprint.iacr.org/2010/375.pdf Ideguchi,Tischhauser,Preneel]&lt;br /&gt;
|-&lt;br /&gt;
| distinguisher || permutation || 224,256 || 8 rounds || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/375.pdf Ideguchi,Tischhauser,Preneel]&lt;br /&gt;
|-&lt;br /&gt;
| distinguisher || compression function || 256 || 10 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;192&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/223.pdf Peyrin]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || compression function || 256 || 9 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/223.pdf Peyrin]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || compression function || 512 || 11 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;640&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2010/223.pdf Peyrin]&lt;br /&gt;
|-  &lt;br /&gt;
| semi-free-start collision || compression function || 256 || 7 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;120&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2009/531.pdf Gilbert,Peyrin]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || compression function || 256 || 8 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;112&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2009/531.pdf Gilbert,Peyrin]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || permutation || 256 || 8 rounds || 2&amp;lt;sup&amp;gt;112&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://eprint.iacr.org/2009/531.pdf Gilbert,Peyrin]&lt;br /&gt;
|-                    &lt;br /&gt;
| semi-free-start collision || compression function || 256 || 7 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;120&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| semi-free-start collision || compression function|| 384,512 || 7 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;152&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| semi-free-start collision || compression function || 224,256 || 6 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124407&amp;amp;pCurrPk=44420 Mendel,Peyrin,Rechberger,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || output transformation || 224,256 || 7 rounds || 2&amp;lt;sup&amp;gt;56&amp;lt;/sup&amp;gt; || - || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124407&amp;amp;pCurrPk=44420 Mendel,Peyrin,Rechberger,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| distinguisher || permutation || 224,256 || 7 rounds || 2&amp;lt;sup&amp;gt;55&amp;lt;/sup&amp;gt; || - || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124407&amp;amp;pCurrPk=44420 Mendel,Peyrin,Rechberger,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| semi-free-start collision || compression function || 256 || 6 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;120&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124409&amp;amp;pCurrPk=40943 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| semi-free-start collision || compression function || 224,256 || 5 rounds (Round 1/2) || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || - || [http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124409&amp;amp;pCurrPk=40943 Mendel,Rechberger,Schläffer,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| observation || hash  || all  ||  ||  ||  || [http://ehash.iaik.tugraz.at/uploads/d/d0/Grostl-comment-april28.pdf Kelsey]&lt;br /&gt;
|-                    &lt;br /&gt;
| observation || block cipher || all ||  ||  ||  || [http://www.larc.usp.br/~pbarreto/Grizzly.pdf Barreto]&lt;br /&gt;
|-                    &lt;br /&gt;
| free-start collision || compression function || all || any || 2&amp;lt;sup&amp;gt;2n/3&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;2n/3&amp;lt;/sup&amp;gt; || [http://www.groestl.info/Groestl.pdf submission document]&lt;br /&gt;
|-                    &lt;br /&gt;
| pseudo-preimage || compression function || all || any || 2&amp;lt;sup&amp;gt;n&amp;lt;/sup&amp;gt; || - || [http://www.groestl.info/Groestl.pdf submission document]&lt;br /&gt;
|-                    &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{fseBCD11,&lt;br /&gt;
  author = {Christina Boura and Anne Canteaut and Christophe De Cannière},&lt;br /&gt;
  title = {Higher-order differential properties of Keccak and Luffa},&lt;br /&gt;
  url = {http://fse2011.mat.dtu.dk/slides/Higher-order%20differential%20properties%20of%20Keccak%20and%20Luffa.pdf},&lt;br /&gt;
  booktitle  = {FSE},&lt;br /&gt;
  year       = {2011},&lt;br /&gt;
  series     = {LNCS},&lt;br /&gt;
  pages     = {252-269},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  volume    = {6733},&lt;br /&gt;
  abstract = {In this paper, we identify higher-order differential and zero-sum properties in the full Keccak-f permutation, in the Luffa v1 hash function, and in components of the Luffa v2 algorithm. These structural properties rely on a new bound on the degree of iterated permutations with a nonlinear layer composed of parallel applications of smaller balanced Sboxes. These techniques yield zero-sum partitions of size $2^{1590}$ for the full Keccak-f permutation and several observations on the Luffa hash family. We first show that Luffa v1 applied to one-block messages is a function of 255 variables with degree at most 251. This observation leads to the construction of a higher-order differential distinguisher for the full Luffa v1 hash function, similar to the one presented by Watanabe et al. on a reduced version. We show that similar techniques can be used to find all-zero higher-order differentials in the Luffa v2 compression function, but the additional blank round destroys this property in the hash function.},&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{groestlSchlaeffer11,&lt;br /&gt;
    author = {Martin Schläffer},&lt;br /&gt;
    title = {Updated Differential Analysis of Grøstl},&lt;br /&gt;
    howpublished = {Grøstl website},&lt;br /&gt;
    month = {January},&lt;br /&gt;
    year = {2011},&lt;br /&gt;
    url = {http://groestl.info/groestl-analysis.pdf},&lt;br /&gt;
    abstract = {Grøstl is a SHA-3 finalist with clear proofs against a large class of differential attacks, similar to those of MD6. Furthermore, in this note we provide an update also regarding more advanced types of differential attacks that have been developed in recent years. We apply the rebound attacks on the initial submission to the tweaked version of Grøstl. We have analyzed the round-reduced hash function and compression function of Grøstl-256 (10 rounds) and Grøstl-512 (14 rounds). For both versions, we get collisions for 3 rounds of the hash function and collisions for 6 rounds of the compression function. We hope that our own efforts on improving the cryptanalysis will continue to motivate and accelerate external cryptanalysis.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{cryptoeprint:2010:607,&lt;br /&gt;
    author = {María Naya-Plasencia},&lt;br /&gt;
    title = {Scrutinizing rebound attacks: new algorithms for improving the complexities},&lt;br /&gt;
    howpublished = {Cryptology ePrint Archive, Report 2010/607},&lt;br /&gt;
    year = {2010},&lt;br /&gt;
    url = {http://eprint.iacr.org/2010/607.pdf},&lt;br /&gt;
    abstract = {Rebound attacks are a state-of-the-art analysis method for hash functions. These cryptanalysis methods are based on a well chosen differential path and have been applied to several hash functions from the SHA-3 competition, providing the best known analysis in these cases. In this paper we study rebound attacks in detail and find for a great number of cases, that complexities of existing attacks can be improved. This is done by determining problems that adapt optimally to the cryptanalytic situation, and by using better algorithms to follow the differential path. These improvements are essentially based on merging big lists in a more efficient way, as well as on new ideas on how to reduce the complexities. As a result, we introduce general purpose new algorithms for enabling further rebound analysis to be as performant as possible. We illustrate our new algorithms for real hash functions and demonstrate how to reduce the complexities of the best known analysis on five hash functions: JH, Grøstl, ECHO, Luffa and Lane (the first four are round two SHA-3 candidates).},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{groestlechoSLWSO10,&lt;br /&gt;
  author = {Yu Sasaki and Yang Li and Lei Wang and Kazuo Sakiyama and Kazuo Ohta},&lt;br /&gt;
  title = {New Non-Ideal Properties of AES-Based Permutations: Applications to ECHO and Grøstl},&lt;br /&gt;
  booktitle = {ASIACRYPT},&lt;br /&gt;
  year      = {2010},&lt;br /&gt;
  pages     = {38-55},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {6477},&lt;br /&gt;
  url = {http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/papers/SASAKI_ECHOanalysisFinal.pdf},&lt;br /&gt;
  abstract = {In this paper, we present non-full-active Super-Sbox analysis which can detect non-ideal&lt;br /&gt;
properties of a class of AES-based permutations with a low complexity. We apply this framework&lt;br /&gt;
to SHA-3 round-2 candidates ECHO and Grøstl. The ﬁrst application is for the full-round (8-round)&lt;br /&gt;
ECHO permutation, which is a building block for 256-bit and 224-bit output sizes. By combining several&lt;br /&gt;
observations speciﬁc to ECHO, our attack detects a non-ideal property with a time complexity of 2^182&lt;br /&gt;
and 2^37 amount of memory. The complexity, especially in terms of the product of time and memory,&lt;br /&gt;
is drastically reduced from the previous best attack which required 2^512 x 2^512. To the best of our knowledge, this is the ﬁrst result on the full-round ECHO permutation with both time and memory below 2^256 or 2^224. Note that this result does not impact the security of the ECHO compression function nor the overall hash function. We also show that our method can detect non-ideal properties of the 8-round Grøstl-256 permutation with a practical complexity, and ﬁnally show that our approach leads&lt;br /&gt;
to an improvement on a semi-free-start collision attack on the 7-round Grøstl-512 compression function.&lt;br /&gt;
Our approach is based on a series of attacks on AES-based hash functions such as rebound attack and&lt;br /&gt;
Super-Sbox analysis. The core idea is using a new diﬀerential path consisting of only non-full-active&lt;br /&gt;
states.}&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{ITP10,&lt;br /&gt;
    author = {Kota Ideguchi and Elmar Tischhauser and Bart Preneel},&lt;br /&gt;
    title = {Improved Collision Attacks on the Reduced-Round Grøstl Hash Function},&lt;br /&gt;
    howpublished = {Cryptology ePrint Archive, Report 2010/375},&lt;br /&gt;
  booktitle = {ISC},&lt;br /&gt;
  year      = {2010},&lt;br /&gt;
  pages     = {1-16},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {6531},&lt;br /&gt;
    url = {http://eprint.iacr.org/2010/375.pdf},&lt;br /&gt;
    abstract = {We analyze the Gr{\o}stl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using the start-from-the-middle variant of the rebound technique, we show collision attacks on the Gr{\o}stl-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities $2^{48}$ and $2^{112}$, respectively. Furthermore, we demonstrate semi-free-start collision attacks on the Gr{\o}stl-224 and -256 hash functions reduced to 7 rounds and the Gr{\o}stl-224 and -256 compression functions reduced to 8 rounds. Our attacks are based on differential paths between the two permutations $P$ and $Q$ of Gr{\o}stl, a strategy introduced by Peyrin to construct distinguishers for the compression function. In this paper, we extend this approach to construct collision and semi-free-start collision attacks for both the hash and the compression function. Finally, we present improved distinguishers for reduced-round versions of the Gr{\o}stl-224 and -256 permutations.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;           &lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;           &lt;br /&gt;
@inproceedings{Pey10,&lt;br /&gt;
    author = {Thomas Peyrin},&lt;br /&gt;
    title = {Improved Differential Attacks for ECHO and Grostl},&lt;br /&gt;
  booktitle = {CRYPTO},&lt;br /&gt;
  year      = {2010},&lt;br /&gt;
  pages     = {370-392},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {6223},&lt;br /&gt;
    url = {http://eprint.iacr.org/2010/223.pdf},&lt;br /&gt;
    abstract = {We present improved cryptanalysis of two second-round SHA-3 candidates: the AES-based hash functions ECHO and Grostl. We explain methods for building better differential trails for ECHO by increasing the granularity of the truncated differential paths previously considered. In the case of Grostl, we describe a new technique, the internal differential attack, which shows that when using parallel computations designers should also consider the differential security between the parallel branches. Then, we exploit the recently introduced start-from-the-middle or Super-Sbox attacks, that proved to be very efficient when attacking AES-like permutations, to achieve a very efficient utilization of the available freedom degrees. Finally, we obtain the best known attacks so far for both ECHO and Grostl. In particular, we are able to mount a distinguishing attack for the full Grostl-256 compression function.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{fseGP10,&lt;br /&gt;
  author    = {Henri Gilbert and Thomas Peyrin},&lt;br /&gt;
  title     = {Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations},&lt;br /&gt;
  booktitle  = {FSE},&lt;br /&gt;
  year       = {2010},&lt;br /&gt;
  series     = {LNCS},&lt;br /&gt;
  volume    = {6147},&lt;br /&gt;
  publisher  = {Springer},&lt;br /&gt;
  pages     = {365-383},&lt;br /&gt;
  url = {http://eprint.iacr.org/2009/531.pdf},&lt;br /&gt;
  abstract = {In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds of such permutations as a layer of big Sboxes preceded and followed by simple affine transformations. The big Sboxes encountered in this alternative representation are named Super-Sboxes. We apply this method to two second-round SHA-3 candidates Grostl and ECHO, and obtain improvements over the previous cryptanalysis results for these two schemes. Moreover, we improve the best distinguisher for the AES block cipher in the known-key setting, reaching 8 rounds for the 128-bit version.}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{ctrsaMRST10,&lt;br /&gt;
  author    = {Florian Mendel and Christian Rechberger and Martin Schläffer and Søren S. Thomsen},&lt;br /&gt;
  title     = {Rebound Attacks on the Reduced Grøstl Hash Function},&lt;br /&gt;
  url = {http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=128007&amp;amp;pCurrPk=47053},&lt;br /&gt;
  booktitle  = {CT-RSA},&lt;br /&gt;
  year       = {2010},&lt;br /&gt;
  publisher  = {Springer},&lt;br /&gt;
  series     = {LNCS},&lt;br /&gt;
  volume    = {5985},&lt;br /&gt;
  pages     = {350-365},&lt;br /&gt;
  abstract = {Grøstl is one of 14 second round candidates of the&lt;br /&gt;
NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression&lt;br /&gt;
function of Grøstl-256 have already been published. However, little is known&lt;br /&gt;
about the hash function, arguably a much more interesting cryptanalytic&lt;br /&gt;
setting. Also, Grøstl-512 has not been analyzed yet. In this paper, we show&lt;br /&gt;
the first cryptanalytic attacks on reduced-round versions of the Grøstl hash&lt;br /&gt;
functions. These results are obtained by several extensions of the rebound&lt;br /&gt;
attack. We present a collision attack on 4/10 rounds of the Grøstl-256 hash&lt;br /&gt;
function and 5/14 rounds of the Grøstl-512 hash functions. Additionally, we&lt;br /&gt;
give the best collision attack for reduced-round (7/10 and 7/14) versions of the&lt;br /&gt;
compression function of Grøstl-256 and Grøstl-512.}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{sacMPRS09,&lt;br /&gt;
  author    = {Florian Mendel and Thomas Peyrin and Christian&lt;br /&gt;
Rechberger and Martin Schläffer},&lt;br /&gt;
  title     = {Improved Cryptanalysis of the Reduced Grøstl&lt;br /&gt;
Compression Function, ECHO Permutation and AES Block Cipher},&lt;br /&gt;
  url = {http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124407&amp;amp;pCurrPk=44420},&lt;br /&gt;
  booktitle  = {SAC},&lt;br /&gt;
  year       = {2009},&lt;br /&gt;
  series     = {LNCS},&lt;br /&gt;
  publisher  = {Springer},&lt;br /&gt;
  volume    = {5867},&lt;br /&gt;
  pages     = {16-35},&lt;br /&gt;
  abstract = {In this paper, we propose two new ways to mount attacks&lt;br /&gt;
on the SHA-3 candidates Gr{\o}stl, and ECHO, and apply these attacks&lt;br /&gt;
also to the AES. Our results improve upon and extend the rebound&lt;br /&gt;
attack. Using the new techniques, we are able to extend the number of&lt;br /&gt;
rounds in which available degrees of freedom can be used. As a result,&lt;br /&gt;
we present the first attack on 7 rounds for the Gr{\o}stl-256 output&lt;br /&gt;
transformation and improve the semi-free-start collision attack on 6&lt;br /&gt;
rounds. Further, we present an improved known-key distinguisher for 7&lt;br /&gt;
rounds of the AES block cipher and the internal permutation used in&lt;br /&gt;
ECHO.}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{fseMRST09,&lt;br /&gt;
  author    = {Florian Mendel and Christian Rechberger and Martin Schläffer and Søren S. Thomsen},&lt;br /&gt;
  title     = {The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl},&lt;br /&gt;
  url = {http://online.tu-graz.ac.at/tug_online/voe_main2.getVollText?pDocumentNr=124409&amp;amp;pCurrPk=40943},&lt;br /&gt;
  booktitle  = {FSE},&lt;br /&gt;
  editor     = {Orr Dunkelman},&lt;br /&gt;
  year       = {2009},&lt;br /&gt;
  publisher  = {Springer},&lt;br /&gt;
  series     = {LNCS},&lt;br /&gt;
  volume    = {5665},&lt;br /&gt;
  pages     = {260-276},&lt;br /&gt;
  abstract = {In this work, we propose the rebound attack, a new tool&lt;br /&gt;
for the cryptanalysis of hash functions. The idea of the rebound&lt;br /&gt;
attack is to use the available degrees of freedom in a collision&lt;br /&gt;
attack to efficiently bypass the low probability parts of a&lt;br /&gt;
differential trail. The rebound attack consists of an inbound phase&lt;br /&gt;
with a match-in-the-middle part to exploit the available degrees of&lt;br /&gt;
freedom, and a subsequent probabilistic outbound phase. Especially on&lt;br /&gt;
AES based hash functions, the rebound attack leads to new attacks for&lt;br /&gt;
a surprisingly high number of&lt;br /&gt;
rounds.&lt;br /&gt;
We use the rebound attack to construct collisions for 4.5 rounds of&lt;br /&gt;
the 512-bit hash function Whirlpool with a complexity of $2^{120}$&lt;br /&gt;
compression function evaluations and negligible memory requirements.&lt;br /&gt;
The attack can be extended to a near-collision on 7.5 rounds of the&lt;br /&gt;
compression function of Whirlpool and 8.5 rounds of the similar hash&lt;br /&gt;
function Maelstrom. Additionally, we apply the rebound attack to the&lt;br /&gt;
SHA-3 submission Gr{\o}stl, which leads to an attack on 6 rounds of&lt;br /&gt;
the Gr{\o}stl-256 compression function with a complexity of $2^{120}$&lt;br /&gt;
and memory requirements of about $2^{64}$.}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{groestlK09,&lt;br /&gt;
  author    = {John Kelsey},&lt;br /&gt;
  title     = {Some notes on Grøstl},&lt;br /&gt;
  url        = {http://ehash.iaik.tugraz.at/uploads/d/d0/Grostl-comment-april28.pdf},&lt;br /&gt;
  howpublished = {NIST hash function mailing list},&lt;br /&gt;
  month     = {April},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract  = {These are some quick notes on some properties and&lt;br /&gt;
observations of Grøstl. Nothing in this note threatens the hash&lt;br /&gt;
function; instead, I'm pointing out some properties that are a bit&lt;br /&gt;
surprising, and some broad approaches someone might take to get&lt;br /&gt;
attacks to work.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{groestlB08,&lt;br /&gt;
  author    = {Paulo S. L. M. Barreto},&lt;br /&gt;
  title     = {An observation on Grøstl},&lt;br /&gt;
  url        = {http://www.larc.usp.br/~pbarreto/Grizzly.pdf},&lt;br /&gt;
  howpublished = {NIST hash function mailing list},&lt;br /&gt;
  month     = {November},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
  abstract  = {An alternative view of the Groestl SHA-3 submission is&lt;br /&gt;
presented. It does not lead to an effective attack nor reveals a&lt;br /&gt;
weakness in the design, but illustrates the importance of the&lt;br /&gt;
double-width pipe in this construction.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Shabal&amp;diff=3425</id>
		<title>Shabal</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Shabal&amp;diff=3425"/>
		<updated>2010-03-31T10:06:07Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: Added the rotational distinguisher&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Emmanuel Bresson, Anne Canteaut, Benoît Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-François Misarsky, Marìa Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-René Reinhard, Céline Thuillet, Marion Videau&lt;br /&gt;
* Website: http://www.shabal.com/&lt;br /&gt;
* NIST submission package: &lt;br /&gt;
** round 1/2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Shabal_Round2.zip Shabal_Round2.zip] (old version: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Shabal.zip Shabal.zip])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3CanteautCGPP08,&lt;br /&gt;
  author    = {Emmanuel Bresson and Anne Canteaut and Benoît Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-François Misarsky and Marìa Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-René Reinhard and Céline Thuillet and Marion Videau},&lt;br /&gt;
  title     = {Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition},&lt;br /&gt;
  url        = {http://ehash.iaik.tugraz.at/uploads/6/6c/Shabal.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{cryptoeprint:2009:199,&lt;br /&gt;
    author = {Emmanuel Bresson and Anne Canteaut and Benoît Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-François Misarsky and Marìa Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-René Reinhard and Céline Thuillet and Marion Videau},&lt;br /&gt;
    title = {Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers},&lt;br /&gt;
    howpublished = {Cryptology ePrint Archive, Report 2009/199},&lt;br /&gt;
    year = {2009},&lt;br /&gt;
    url = {http://eprint.iacr.org/2009/199.pdf},&lt;br /&gt;
    abstract = {Shabal is based on a new provably secure mode of operation. Some related-key distinguishers for the underlying keyed permutation have been exhibited recently by Aumasson et al. and Knudsen et al., but with no visible impact on the security of Shabal. This paper then aims at extensively studying such distinguishers for the keyed permutation used in Shabal, and at clarifying the impact that they exert on the security of the full hash function. Most interestingly, a new security proof for Shabal's mode of operation is provided where the keyed permutation is not assumed to be an ideal cipher anymore, but observes a distinguishing property i.e., an explicit relation verified by all its inputs and outputs. As a consequence of this extended proof, all known distinguishers for the keyed permutation are proven not to weaken the security of Shabal. In our study, we provide the foundation of a generalization of the indifferentiability framework to biased random primitives, this part being of independent interest.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
We distinguish between two cases: results on the complete hash function, and results on underlying building blocks.&lt;br /&gt;
&lt;br /&gt;
A description of the tables is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hash function ===&lt;br /&gt;
&lt;br /&gt;
Here we list results on the hash function according to the NIST requirements. The only allowed modification is to change the security parameter.&lt;br /&gt;
&lt;br /&gt;
Recommended security parameters: (p,r)='''(3,12)'''&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
| Type of Analysis || Hash Size (n) || Parameters || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-                    &lt;br /&gt;
| || || || || ||&lt;br /&gt;
|-                    &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Building blocks ===&lt;br /&gt;
&lt;br /&gt;
Here we list results on underlying building blocks, and the hash function modified by other means than the security parameter.&lt;br /&gt;
&lt;br /&gt;
Note that these results assume more direct control or access over some internal variables (aka. free-start, pseudo, compression function, block cipher, or permutation attacks). &lt;br /&gt;
&lt;br /&gt;
Recommended security parameters: (p,r)='''(3,12)'''&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
|   Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-                                        &lt;br /&gt;
|   | non-randomness&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt; || permutation || all || || 2&amp;lt;sup&amp;gt;12&amp;lt;/sup&amp;gt; || || [http://131002.net/data/papers/Aum09.pdf Aumasson]&lt;br /&gt;
|-                                              &lt;br /&gt;
|   | non-randomness&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt; || permutation || all || || 1 || || [http://www.mat.dtu.dk/people/S.Thomsen/shabal/shabal.pdf Knudsen,Matusiewicz,Thomsen]&lt;br /&gt;
|-  &lt;br /&gt;
|   | non-randomness&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt; || permutation || all || || 2 || || [http://131002.net/data/papers/AMM09.pdf Aumasson,Mashatan,Meier]&lt;br /&gt;
|-                                           &lt;br /&gt;
|   | non-randomness || permutation || all || || 2&amp;lt;sup&amp;gt;159&amp;lt;/sup&amp;gt; || || [http://gva.noekeon.org/papers/ShabalRotation.pdf Van Assche]&lt;br /&gt;
|-                                           &lt;br /&gt;
|}                    &lt;br /&gt;
&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt;The Shabal team commented on these analyses and provide an update of their security proofs in [http://eprint.iacr.org/2009/199.pdf this note].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{shabalAum09,&lt;br /&gt;
  author    = {Jean-Philippe Aumasson},&lt;br /&gt;
  title     = {On the pseudorandomness of Shabal's keyed permutation},&lt;br /&gt;
  url        = {http://131002.net/data/papers/Aum09.pdf},&lt;br /&gt;
  howpublished = {Available online},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract = {&lt;br /&gt;
  We report observations suggesting that the permutation used in&lt;br /&gt;
  Shabal does not behave pseudorandomly. This does not affect the&lt;br /&gt;
  security of Shabal as submitted to the NIST Hash Competition.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{shabalKMT09,&lt;br /&gt;
  author    = {Lars R. Knudsen and Krystian Matusiewicz and Søren S. Thomsen},&lt;br /&gt;
  title     = {Observations on the Shabal keyed permutation},&lt;br /&gt;
  url        = {http://www.mat.dtu.dk/people/S.Thomsen/shabal/shabal.pdf },&lt;br /&gt;
  howpublished = {OFFICIAL COMMENT},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract = {&lt;br /&gt;
 In this note we show that the permutation P used in the Shabal hash function, which is&lt;br /&gt;
a candidate in the SHA-3 competition, has some non-random properties. As an example,&lt;br /&gt;
it is easy to find a number of fixed points in the permutation. Moreover, large key-multicollisions&lt;br /&gt;
can be easily found; these are multi-collisions where only the key input contains&lt;br /&gt;
a difference. All observations are easily verified, and most of them are independent of the&lt;br /&gt;
choice of security parameters. Our observations, on the other hand, do not seem extensible&lt;br /&gt;
to the full hash function.&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{shabalAum09a,&lt;br /&gt;
  author    = {Jean-Philippe Aumasson and Atefeh Mashatan and Willi Meier},&lt;br /&gt;
  title     = {More on Shabal's permutation},&lt;br /&gt;
  url        = {http://131002.net/data/papers/AMM09.pdf},&lt;br /&gt;
  howpublished = {OFFICIAL COMMENT},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{shabalVA10,&lt;br /&gt;
  author    = {Gilles Van Assche},&lt;br /&gt;
  title     = {A rotational distinguisher on Shabal's keyed permutation and its impact on the security proofs},&lt;br /&gt;
  url        = {http://gva.noekeon.org/papers/ShabalRotation.pdf},&lt;br /&gt;
  howpublished = {Available online},&lt;br /&gt;
  year      = {2010},&lt;br /&gt;
  abstract = {In this short note, we apply a rotational distinguisher to the keyed permutation of the SHA-3 candidate Shabal. We then discuss its applicability in the scope of Shabal's mode of operation and its impact on the security proofs.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Keccak&amp;diff=3310</id>
		<title>Keccak</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Keccak&amp;diff=3310"/>
		<updated>2010-01-20T10:15:39Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche&lt;br /&gt;
* Website: [http://keccak.noekeon.org/ http://keccak.noekeon.org/] &lt;br /&gt;
* NIST submission package: &lt;br /&gt;
** round 1: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Keccak.zip Keccak.zip]&lt;br /&gt;
** round 2: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Keccak_Round2.zip Keccak_Round2.zip]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakSpecs2,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak specifications},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-specifications-2.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 2)},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakMain2,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak sponge function family main document},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-main-2.0.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 2)},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakSpecs,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak specifications},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-specifications.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 1)},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakMain,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak sponge function family main document},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-main-1.0.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (Round 1)},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-                    &lt;br /&gt;
| observations || permutation || all ||  ||  ||  || [http://131002.net/data/papers/AK09.pdf Aumasson,Khovratovich]&lt;br /&gt;
|-   &lt;br /&gt;
| cube attack  || partial preimage || 224 || 4 rounds || 2&amp;lt;sup&amp;gt;19&amp;lt;/sup&amp;gt; || ? || [http://www.cs.rit.edu/~jal6806/thesis/thesis.pdf Joel,Lathrop]&lt;br /&gt;
|-   &lt;br /&gt;
| distinguisher&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt;  || permutation || all || 16 rounds || 2&amp;lt;sup&amp;gt;1023.88&amp;lt;/sup&amp;gt; || || [http://www.131002.net/data/papers/AM09.pdf Aumasson,Meier]&lt;br /&gt;
|-   &lt;br /&gt;
| distinguisher&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt;  || permutation || all || 18 rounds || 2&amp;lt;sup&amp;gt;1370&amp;lt;/sup&amp;gt; || || [http://www-roc.inria.fr/secret/Anne.Canteaut/Publications/zero_sum.pdf Boura,Canteaut]&lt;br /&gt;
|-  &lt;br /&gt;
|}&lt;br /&gt;
               &lt;br /&gt;
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;sup&amp;gt;(1)&amp;lt;/sup&amp;gt;The Keccak team commented on these distinguishers and provide generic constructions in [http://keccak.noekeon.org/NoteZeroSum.pdf this note].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{keccakAK09,&lt;br /&gt;
  author    = {Jean-Philippe Aumasson and Dmitry Khovratovich},&lt;br /&gt;
  title     = {First Analysis of Keccak},&lt;br /&gt;
  url        = {http://131002.net/data/papers/AK09.pdf},&lt;br /&gt;
  howpublished = {Available online},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract  = {We apply known automated cryptanalytic tools to the Keccak-f[1600] permutation, using&lt;br /&gt;
a triangulation tool to solve the CICO problem, and cube testers to detect some structure in the&lt;br /&gt;
algebraic description of the reduced Keccak-f[1600]. The applicability of our tools was notably limited&lt;br /&gt;
by the strength of the inverse permutation.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{keccakAK09,&lt;br /&gt;
  author    = {Joel Lathrop},&lt;br /&gt;
  title     = {Cube Attacks on Cryptographic Hash Functions},&lt;br /&gt;
  url        = {http://www.cs.rit.edu/~jal6806/thesis/thesis.pdf},&lt;br /&gt;
  howpublished = {Available online},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract  = {The thesis includes a successful cube attack against 4-round Keccak complete with a table of maxterms, analysis of the attack, and the estimated limits of its extension to higher numbers of rounds.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{keccakAM09,&lt;br /&gt;
  author    = {Jean-Philippe Aumasson and Willi Meier},&lt;br /&gt;
  title     = {Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi},&lt;br /&gt;
  url        = {http://www.131002.net/data/papers/AM09.pdf},&lt;br /&gt;
  howpublished = {NIST mailing list}&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract  = {We present a new type of distinguisher, called zero-sum distinguisher, and apply it to reduced versions of the Keccak-f permutation. We obtain practical and deterministic distinguishers on up to 9 rounds, and shortcut distinguishers on up to 16 rounds, out of 18 in total. These observations do not seem to affect the security of Keccak. We also briefly describe application of zero-sum distinguishers to the core permutations of Luffa and Hamsi.},&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{keccakBC10,&lt;br /&gt;
  author    = {Christina Boura and Anne Canteaut},&lt;br /&gt;
  title     = {A Zero-Sum property for the Keccak-f Permutation with 18 Rounds},&lt;br /&gt;
  url        = {http://www-roc.inria.fr/secret/Anne.Canteaut/Publications/zero_sum.pdf},&lt;br /&gt;
  howpublished = {NIST mailing list}&lt;br /&gt;
  year      = {2010},&lt;br /&gt;
  abstract  = {A new type of distinguishing property, named the zero-sum property&lt;br /&gt;
has been recently presented by Aumasson and Meier [1]. It has&lt;br /&gt;
been applied to the inner permutation of the hash function Keccak&lt;br /&gt;
and it has led to a distinguishing property for the Keccak-f permutation&lt;br /&gt;
up to 16 rounds, out of 24 in total. Here, we additionally exploit&lt;br /&gt;
some spectral properties of the Keccak-f permutation and we improve&lt;br /&gt;
the previously known upper bounds on the degree of the inverse&lt;br /&gt;
permutation after a certain number of rounds. This result enables us&lt;br /&gt;
to extend the zero-sum property to 18 rounds of the Keccak-f permutation,&lt;br /&gt;
which was the number of rounds in the previous version of&lt;br /&gt;
Keccak submitted to the SHA-3 competition..},&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakNoteZeroSum,&lt;br /&gt;
author = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
title = {Note on zero-sum distinguishers of Keccak-f},&lt;br /&gt;
url = {http://keccak.noekeon.org/NoteZeroSum.pdf},&lt;br /&gt;
howpublished = {NIST mailing list},&lt;br /&gt;
year = {2010},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Keccak&amp;diff=3110</id>
		<title>Keccak</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Keccak&amp;diff=3110"/>
		<updated>2009-05-04T08:02:37Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: Updated main document entry now refers to version 1.2&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche&lt;br /&gt;
* Website: [http://keccak.noekeon.org/ http://keccak.noekeon.org/] &lt;br /&gt;
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Keccak.zip Keccak.zip]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakSpecs,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak specifications},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-specifications.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakMain_original,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak sponge function family main document},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-main-1.0.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakMain_latest,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak sponge function family main document},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-main-1.2.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (updated)},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-                    &lt;br /&gt;
| observations || permutation || all ||  ||  ||  || [http://131002.net/data/papers/AK09.pdf Aumasson,Khovratovich]&lt;br /&gt;
|-   &lt;br /&gt;
|}&lt;br /&gt;
               &lt;br /&gt;
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{keccakAK09,&lt;br /&gt;
  author    = {Jean-Philippe Aumasson and Dmitry Khovratovich},&lt;br /&gt;
  title     = {First Analysis of Keccak},&lt;br /&gt;
  url        = {http://131002.net/data/papers/AK09.pdf},&lt;br /&gt;
  howpublished = {Available online},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
  abstract  = {We apply known automated cryptanalytic tools to the Keccak-f[1600] permutation, using&lt;br /&gt;
a triangulation tool to solve the CICO problem, and cube testers to detect some structure in the&lt;br /&gt;
algebraic description of the reduced Keccak-f[1600]. The applicability of our tools was notably limited&lt;br /&gt;
by the strength of the inverse permutation.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Keccak&amp;diff=2997</id>
		<title>Keccak</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Keccak&amp;diff=2997"/>
		<updated>2009-02-23T09:40:08Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: Added updated main document&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche&lt;br /&gt;
* Website: [http://keccak.noekeon.org/ http://keccak.noekeon.org/] &lt;br /&gt;
* NIST submission package: [http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Keccak.zip Keccak.zip]&lt;br /&gt;
* Specification:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakSpecs,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak specifications},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-specifications.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakMain_original,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak sponge function family main document},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-main-1.0.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{KeccakMain_latest,&lt;br /&gt;
  author    = {G. Bertoni and J. Daemen and M. Peeters and G. Van Assche},&lt;br /&gt;
  title     = {Keccak sponge function family main document},&lt;br /&gt;
  url        = {http://keccak.noekeon.org/Keccak-main-1.1.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST (updated)},&lt;br /&gt;
  year      = {2009},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
* None yet&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2684</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2684"/>
		<updated>2008-12-12T15:04:01Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[Abacus]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ARIRANG]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[AURORA]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blender]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Cheetah]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA]]                      || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA2]]                     || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ECHO]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ECOH]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Hamsi]]                            || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Khichidi-1]]                       || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[LANE]]                             || submitted || none   || HAIFA/concatenate-permute-truncate or Damg&amp;amp;aring;rd interleaving [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Lesamnta]]                         || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Luffa]]                            || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[LUX]]                              || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || bounded-height Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MeshHash]]                         || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SANDstorm]]                        || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Shabal]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAvite-3]]                        || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[SIMD]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Tangle]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[TIB3]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Twister]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I just wish to say that the terminology about ''sponge'' sometimes seems to spread across things that are not sponge functions according to the definition in our paper [http://sponge.noekeon.org Sponge Functions]. I have not checked all the entries marked &amp;quot;sponge&amp;quot; in the table above, but I have some doubts about whether these hash functions actually use the sponge construction. For instance, I checked JH and it does not seem they use the sponge construction. Instead, they use MD and a compression function (built on top of a permutation). Also, RadioGatún seems to be sometimes described as a sponge function, when it is not, see [http://radiogatun.noekeon.org/index.html#notasponge].&lt;br /&gt;
&lt;br /&gt;
Gilles&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2683</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2683"/>
		<updated>2008-12-12T13:18:42Z</updated>

		<summary type="html">&lt;p&gt;GVanAssche: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[Abacus]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ARIRANG]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[AURORA]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blender]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Cheetah]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA]]                      || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA2]]                     || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ECHO]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ECOH]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Hamsi]]                            || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Khichidi-1]]                       || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[LANE]]                             || submitted || none   || HAIFA/concatenate-permute-truncate or Damg&amp;amp;aring;rd interleaving [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Lesamnta]]                         || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Luffa]]                            || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[LUX]]                              || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || bounded-height Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MeshHash]]                         || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SANDstorm]]                        || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Shabal]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAvite-3]]                        || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[SIMD]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Tangle]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[TIB3]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Twister]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I just wish to say that the terminology about ''sponge'' sometimes seems to spread across things that are not sponge functions according to the definition in our paper [http://sponge.noekeon.org Sponge Functions]. I have not checked all the entries marked &amp;quot;sponge&amp;quot; in the table above, but I have some doubts about whether these hash functions actually use the sponge construction. For instance, I checked JH and it does not seem they use the sponge construction. Instead, they use a compression function (built on top of a permutation). Also, RadioGatún seems to be sometimes described as a sponge function, when it is not, see [http://radiogatun.noekeon.org/index.html#notasponge].&lt;br /&gt;
&lt;br /&gt;
Gilles&lt;/div&gt;</summary>
		<author><name>GVanAssche</name></author>
		
	</entry>
</feed>