<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://ehash.iaik.tugraz.at/api.php?action=feedcontributions&amp;user=PBarreto&amp;feedformat=atom</id>
	<title>The ECRYPT Hash Function Website - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://ehash.iaik.tugraz.at/api.php?action=feedcontributions&amp;user=PBarreto&amp;feedformat=atom"/>
	<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/wiki/Special:Contributions/PBarreto"/>
	<updated>2024-07-08T07:48:49Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.3</generator>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2743</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2743"/>
		<updated>2008-12-20T13:49:35Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[Abacus]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ARIRANG]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[AURORA]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blender]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Cheetah]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA]]                      || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA2]]                     || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ECHO]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[ECOH]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Hamsi]]                            || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Khichidi-1]]                       || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[LANE]]                             || submitted || none   || HAIFA/concatenate-permute-truncate or Damg&amp;amp;aring;rd interleaving [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Lesamnta]]                         || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Luffa]]                            || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[LUX]]                              || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || bounded-height Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MeshHash]]                         || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SANDstorm]]                        || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Shabal]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAvite-3]]                        || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[SIMD]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Tangle]]                           || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[TIB3]]                             || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Twister]]                          || submitted || none   || ? [?]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I just wish to say that the terminology about ''sponge'' sometimes seems to spread across things that are not sponge functions according to the definition in our paper [http://sponge.noekeon.org Sponge Functions]. I have not checked all the entries marked &amp;quot;sponge&amp;quot; in the table above, but I have some doubts about whether these hash functions actually use the sponge construction. For instance, I checked JH and it does not seem they use the sponge construction. Instead, they use MD and a compression function (built on top of a permutation). Also, RadioGatún seems to be sometimes described as a sponge function, when it is not, see [http://radiogatun.noekeon.org/index.html#notasponge].&lt;br /&gt;
&lt;br /&gt;
Gilles&lt;br /&gt;
&lt;br /&gt;
Hi, I agree with those saying that a categorization can never be exact. A possibility is to collect a list of headlines such as &amp;quot;Merkle-Damgård&amp;quot;, &amp;quot;Sponge&amp;quot;, &amp;quot;Block cipher-based&amp;quot;, &amp;quot;Permutation-based&amp;quot; etc., and state an indication as to which degree each hash function can be said to fall into each category. As an example, we say that Grøstl is permutation-based, but as Paulo showed, it can also be seen as being block cipher-based, so on a scale from, e.g., 0-4, Grøstl may be permutation-based to a degree of 3, and block cipher-based to a degree of 1 (just an example!). It is &amp;quot;almost&amp;quot; an MD construction, but not quite, so we may say it is MD to a degree of 2 or 3. The question is whether such a categorization will be more fair, more useful, etc., than a true/false categorization.&lt;br /&gt;
&lt;br /&gt;
However, my personal opinion is that we should avoid completely to categorize hash functions (except in 100% objective ways such as internal state size, message block size, status in the competition etc. - some of which you may also argue are not 100% objective). I also think we should not deem hash functions as being &amp;quot;broken&amp;quot; or &amp;quot;damaged&amp;quot;, we should just link to all published results, and let people make up their own minds. I am assuming we did not build the SHA-3 Zoo in an attempt to have an influence on NIST's decisions.&lt;br /&gt;
&lt;br /&gt;
/Søren&lt;br /&gt;
&lt;br /&gt;
== new tables ==&lt;br /&gt;
&lt;br /&gt;
This is a draft for the new tables to show the analysis and complexities of each hash function. The first table is shown at the main page, the entries of the second table are only shown at the Wiki page of each hash function.&lt;br /&gt;
&lt;br /&gt;
Martin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
main table:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;120&amp;quot;| Hash Name      !! width=&amp;quot;100&amp;quot;| Status !! width=&amp;quot;100&amp;quot;| External Cryptanalysis !! width=&amp;quot;100&amp;quot;| practical example !! width=&amp;quot;100&amp;quot;| time*memory &amp;lt; generic !! width=&amp;quot;100&amp;quot;| compr. calls &amp;lt; generic&lt;br /&gt;
|-&lt;br /&gt;
| [[Abacus]]      || 1st round || style=&amp;quot;background:orange&amp;quot; | yes || || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[ARIRANG]]     || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[AURORA]]      || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]       || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Blender]]     || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]] || 1st round || style=&amp;quot;background:green&amp;quot; | yes  || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]       || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Cheetah]]     || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]         || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]      || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]    || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]         || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA]] || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Dynamic SHA2]] || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[ECHO]]        || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[ECOH]]        || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]      || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]     || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]] || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]       || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]] || 1st round || style=&amp;quot;background:green&amp;quot; | yes || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]     || submitted || style=&amp;quot;background:black&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Hamsi]]       || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]          || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes  || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]      || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Khichidi-1]]  || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[LANE]]        || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Lesamnta]]    || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Luffa]]       || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[LUX]]         || 1st round || style=&amp;quot;background:green&amp;quot; | yes  || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]      || submitted || style=&amp;quot;background:black&amp;quot; | yes  || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]    || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]         || 1st round || style=&amp;quot;background:green&amp;quot; | yes || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[MeshHash]]    || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]       || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]       || submitted || style=&amp;quot;background:black&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]       || submitted || style=&amp;quot;background:black&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[SANDstorm]]   || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]      || 1st round || style=&amp;quot;background:green&amp;quot; | yes || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]       || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Shabal]]      || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]     || 1st round || style=&amp;quot;background:green&amp;quot; | yes || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAvite-3]]   || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[SIMD]]        || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]       || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]] || 1st round || style=&amp;quot;background:green&amp;quot; | yes  || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[StreamHash]]  || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]     || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Tangle]]      || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[TIB3]]        || 1st round || none || || ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Twister]]     || 1st round || style=&amp;quot;background:orange&amp;quot; | yes || || X || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || 1st round || style=&amp;quot;background:yellow&amp;quot; | yes || || || X &lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]        || 1st round || style=&amp;quot;background:red&amp;quot; | yes || X  || X  || X &lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]   || 1st round || none || || ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
caption for main table:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;100&amp;quot;| color !! External Cryptanalysis or Status !! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|                             || no external cryptanalysis || no external cryptanalysis for this hash function has been published&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:green&amp;quot;  | || external cryptanalysis    || external cryptanalysis published but does not violate the NIST requirements&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:yellow&amp;quot; | || compr. calls &amp;lt; generic    || the number of compression function calls is below generic attacks for collision, 2nd preimage or preimage&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:orange&amp;quot; | || time*memory &amp;lt; generic     || the time*memory product is below generic attacks for collision, 2nd preimage or preimage&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:red&amp;quot; |    || practical example         || a practical (collision) example is given for the hash function&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:black&amp;quot; |  || not in round 1            || this hash function did not advance to round 1 of the NIST competition&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Individual hash function tables:&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center&amp;quot;                   &lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;                   &lt;br /&gt;
| Hash Function Name ||   Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||   Reference &lt;br /&gt;
|-                    &lt;br /&gt;
| Abacus  || style=&amp;quot;background:orange&amp;quot; | 2nd preimage || hash || ? ||  || 2&amp;lt;sup&amp;gt;344&amp;lt;/sup&amp;gt; || - || [http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf Wilson]&lt;br /&gt;
|-                    &lt;br /&gt;
| Abacus  || style=&amp;quot;background:orange&amp;quot; | collision || hash || ? ||  || 2&amp;lt;sup&amp;gt;172&amp;lt;/sup&amp;gt; || - || [http://web.mit.edu/dwilson/www/hash/abacus_attack.pdf Wilson]&lt;br /&gt;
|-                    &lt;br /&gt;
| Abacus  || style=&amp;quot;background:orange&amp;quot; | 2nd preimage || hash || ? ||  || 2&amp;lt;sup&amp;gt;172&amp;lt;/sup&amp;gt; || - || [http://lj.streamclub.ru/papers/hash/abacus.pdf Nikolić,Khovratovich]&lt;br /&gt;
|-                    &lt;br /&gt;
| Blue Midnight Wish ||  | near collision || compression || all ||  || - || - || [http://www2.mat.dtu.dk/people/S.Thomsen/bmw/nc-compress.pdf Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| Boole || style=&amp;quot;background:orange&amp;quot; | preimage || hash || all ||  || 2&amp;lt;sup&amp;gt;9n/16&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/2/2f/Boole.pdf Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| Boole || style=&amp;quot;background:red&amp;quot; | collision || hash || 224,256 ||  || example, 2&amp;lt;sup&amp;gt;34&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/0/0b/BooleCollision.txt Mendel,Nad,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| Boole || style=&amp;quot;background:red&amp;quot; | collision || hash || 384,512 ||  || 2&amp;lt;sup&amp;gt;66&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/0/0b/BooleCollision.txt Mendel,Nad,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| CubeHash ||  | observations ||  || all || 8/1 ||  ||  || [http://eprint.iacr.org/2008/486.pdf Aumasson,Meier,Naya-Plasencia,Peyrin]&lt;br /&gt;
|-                    &lt;br /&gt;
| CubeHash || style=&amp;quot;background:yellow&amp;quot; | preimage || hash || 512 ||  || 2&amp;lt;sup&amp;gt;511&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;508&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| CubeHash ||  | preimage || hash || 512 || r/4 || 2&amp;lt;sup&amp;gt;496&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| CubeHash ||  | preimage || hash || 512 || r/8 || 2&amp;lt;sup&amp;gt;480&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/6/6c/Cubehash.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| CubeHash ||  | collision || hash || 512 || 2/120 || example || - || [http://ehash.iaik.tugraz.at/uploads/a/a9/Cubehash.txt Aumasson]&lt;br /&gt;
|-                    &lt;br /&gt;
| DCH || style=&amp;quot;background:red&amp;quot; | collision || hash || all ||  || 521 || - || [http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf Mendel,Lamberger]&lt;br /&gt;
|-                    &lt;br /&gt;
| DCH || style=&amp;quot;background:red&amp;quot; | preimage || hash || all ||  || 521 || - || [http://ehash.iaik.tugraz.at/uploads/9/9b/Dch.pdf Mendel,Lamberger]&lt;br /&gt;
|-                    &lt;br /&gt;
| DCH || style=&amp;quot;background:orange&amp;quot; | collision || hash || all ||  || 2&amp;lt;sup&amp;gt;45&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;45&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/b/b7/Dch1.pdf Khovratovich,Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| DCH || style=&amp;quot;background:orange&amp;quot; | preimage || hash || all ||  || 2&amp;lt;sup&amp;gt;45&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;45&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/b/b7/Dch1.pdf Khovratovich,Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| DCH || style=&amp;quot;background:yellow&amp;quot; | 2nd preimage || hash || 512 ||  || 2&amp;lt;sup&amp;gt;450&amp;lt;/sup&amp;gt; || ? || [http://web.mit.edu/dwilson/www/hash/ Rechberger]&lt;br /&gt;
|-                    &lt;br /&gt;
| Edon-R ||  | collision || compression || ? ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/7/74/Edon.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| Edon-R ||  | 2nd preimage || compression || ? ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/7/74/Edon.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| Edon-R ||  | preimage || compression || ? ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/7/74/Edon.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| Edon-R || style=&amp;quot;background:yellow&amp;quot; | preimage || hash || ? ||  || 2&amp;lt;sup&amp;gt;2n/3&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;2n/3&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/7/74/Edon.pdf Khovratovich,Nikolić,Weinmann]&lt;br /&gt;
|-                    &lt;br /&gt;
| Edon-R ||  | multicollision (2&amp;lt;sup&amp;gt;K&amp;lt;/sup&amp;gt;) || hash || 256,512 ||  || K*2&amp;lt;sup&amp;gt;n/2&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;n/2&amp;lt;/sup&amp;gt; || [http://cryptography.hyperlink.cz/BMW/EDONR_analysis_vk.pdf Klima]&lt;br /&gt;
|-                    &lt;br /&gt;
| Edon-R ||  | multipreimage || hash || 256,512 ||  || ? || ? || [http://cryptography.hyperlink.cz/BMW/EDONR_analysis_vk.pdf Klima]&lt;br /&gt;
|-                    &lt;br /&gt;
| EnRUPT || style=&amp;quot;background:yellow&amp;quot; | preimage || hash || 512 ||  || 2&amp;lt;sup&amp;gt;480&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;480&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/9/9b/Enrupt.pdf Khovratovich,Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| EnRUPT || style=&amp;quot;background:red&amp;quot; | collision || hash || 256 ||  || example, 2&amp;lt;sup&amp;gt;47&amp;lt;/sup&amp;gt; || - || [http://homes.esat.kuleuven.be/~sindeste/enrupt.html Indesteege]&lt;br /&gt;
|-                    &lt;br /&gt;
| Grøstl ||  | observation || block cipher || all ||  ||  ||  || [http://www.larc.usp.br/~pbarreto/Grizzly.pdf Barreto]&lt;br /&gt;
|-                    &lt;br /&gt;
| Hash 2X || style=&amp;quot;background:red&amp;quot; | 2nd preimage || hash || ? ||  || example || - || [http://tibasicdev.wikidot.com/archives:hash-2x/comments/show#post-302617 Aumasson]&lt;br /&gt;
|-                    &lt;br /&gt;
| JH ||  | pseudo collision || compression || all ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/a/a8/Jh1.txt Bagheri]&lt;br /&gt;
|-                    &lt;br /&gt;
| JH ||  | pseudo 2nd preimage || compression || all ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/a/a8/Jh1.txt Bagheri]&lt;br /&gt;
|-                    &lt;br /&gt;
| JH || style=&amp;quot;background:yellow&amp;quot; | preimage || hash || all ||  || 2&amp;lt;sup&amp;gt;510.3&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;510.3&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/d/da/Jh_preimage.pdf Mendel,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| KhiChidi-1 || style=&amp;quot;background:red&amp;quot; | collision || hash || 256 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/8/89/Khichidi-1.txt Mouha]&lt;br /&gt;
|-                    &lt;br /&gt;
| LUX ||  | collision || reduced hash || 224 || 3 blank rounds || - || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu]&lt;br /&gt;
|-                    &lt;br /&gt;
| LUX ||  | near collision || reduced hash || 256 || 3 blank rounds || - || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu]&lt;br /&gt;
|-                    &lt;br /&gt;
| LUX ||  | free-start collision || compression || ? ||  || - || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu]&lt;br /&gt;
|-                    &lt;br /&gt;
| LUX ||  | free-start preimage || compression || ? ||  || 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/3/36/Analysis_LUX_1.pdf Wu,Feng,Wu]&lt;br /&gt;
|-                    &lt;br /&gt;
| Maraca ||  | internal collision || internal state || 512 ||  || 2&amp;lt;sup&amp;gt;237&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;230.5&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/5/52/Maraca.pdf Canteaut,Naya-Plasencia]&lt;br /&gt;
|-                    &lt;br /&gt;
| MCSSHA-3 || style=&amp;quot;background:yellow&amp;quot; | collision || hash || all ||  || 2&amp;lt;sup&amp;gt;3n/8&amp;lt;/sup&amp;gt; || ? || [http://131002.net/data/papers/AN08.pdf Aumasson,Naya-Plasencia]&lt;br /&gt;
|-                    &lt;br /&gt;
| MCSSHA-3 || style=&amp;quot;background:yellow&amp;quot; | 2nd preimage || hash || all ||  || 2&amp;lt;sup&amp;gt;3n/4&amp;lt;/sup&amp;gt; || ? || [http://131002.net/data/papers/AN08.pdf Aumasson,Naya-Plasencia]&lt;br /&gt;
|-                    &lt;br /&gt;
| MD6 ||  | non-randomness || reduced compression || ? || 18 rounds || ? || ? || [http://groups.csail.mit.edu/cis/md6/supmitted-2008-10-27/Supporting_Documentation/md6_report.pdf Aumasson,Meier]&lt;br /&gt;
|-                    &lt;br /&gt;
| MD6 ||  | key-recovery || reduced compression || ? || 15 rounds || ? || ? || [http://groups.csail.mit.edu/cis/md6/supmitted-2008-10-27/Supporting_Documentation/md6_report.pdf Dinur,Shamir]&lt;br /&gt;
|-                    &lt;br /&gt;
| MeshHash || style=&amp;quot;background:yellow&amp;quot; | 2nd preimage || hash || 256 ||  || 2&amp;lt;sup&amp;gt;194.3&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt; || [http://www.mat.dtu.dk/people/S.Thomsen/meshhash/2ndpreimage.pdf Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| MeshHash || style=&amp;quot;background:yellow&amp;quot; | 2nd preimage || hash || 512 ||  || 2&amp;lt;sup&amp;gt;323.2&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt; || [http://www.mat.dtu.dk/people/S.Thomsen/meshhash/2ndpreimage.pdf Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| NaSHA ||  | free-start collision || compression || all ||  || 2&amp;lt;sup&amp;gt;32&amp;lt;/sup&amp;gt; || ? || [http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf Nikolić,Khovratovich]&lt;br /&gt;
|-                    &lt;br /&gt;
| NaSHA ||  | free-start preimage || compression || 224,256 ||  || ~2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt; || ? || [http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf Nikolić,Khovratovich]&lt;br /&gt;
|-                    &lt;br /&gt;
| NaSHA ||  | free-start preimage || compression || 384,512 ||  || ~2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt; || ? || [http://ehash.iaik.tugraz.at/uploads/3/33/Free-start_attacks_on_Nasha.pdf Nikolić,Khovratovich]&lt;br /&gt;
|-                    &lt;br /&gt;
| NaSHA ||  | free-start collision || compression || all ||  || - || - || [http://eprint.iacr.org/2008/519.pdf Ji,Liangyu,Xu]&lt;br /&gt;
|-                    &lt;br /&gt;
| NaSHA || style=&amp;quot;background:yellow&amp;quot; | collision || hash || 512 ||  || 2&amp;lt;sup&amp;gt;192&amp;lt;/sup&amp;gt; || ? || [http://eprint.iacr.org/2008/519.pdf Ji,Liangyu,Xu]&lt;br /&gt;
|-                    &lt;br /&gt;
| NKS2D || style=&amp;quot;background:red&amp;quot; | collision || hash || 224 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/3/3f/NK2SD-224.txt De Cannière]&lt;br /&gt;
|-                    &lt;br /&gt;
| NKS2D || style=&amp;quot;background:red&amp;quot; | collision || hash || 512 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/9/93/NK2SD-512.txt Enright]&lt;br /&gt;
|-                    &lt;br /&gt;
| Ponic || style=&amp;quot;background:yellow&amp;quot; | 2nd preimage || hash || 512 ||  || 2&amp;lt;sup&amp;gt;265&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt; || [http://131002.net/data/papers/ponic.pdf Naya-Plasencia]&lt;br /&gt;
|-                    &lt;br /&gt;
| Sarmal ||  | preimage (salt size s) || hash || 512 ||  || max(2&amp;lt;sup&amp;gt;512-s&amp;lt;/sup&amp;gt;,2&amp;lt;sup&amp;gt;256+s&amp;lt;/sup&amp;gt;) || 2&amp;lt;sup&amp;gt;s&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/7/77/Sarmal.pdf Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| Sgàil || style=&amp;quot;background:red&amp;quot; | collision || hash || ? ||  || example || - || [http://www.allicient.co.uk/2008/11/05/aww-psh/ Maxwell]&lt;br /&gt;
|-                    &lt;br /&gt;
| SHAMATA ||  | observation || block cipher ||  ||  ||  ||  || [http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/Research/SHA3/Observations_for_SHAMATA.pdf Fleischmann,Gorski]&lt;br /&gt;
|-                    &lt;br /&gt;
| SHAMATA ||  | observation || block cipher ||  ||  ||  ||  || [http://www.uekae.tubitak.gov.tr/uekae_content_files/crypto/improved_analysis_of_Shamata-BC.pdf Atalay,Kara,Karakoc]&lt;br /&gt;
|-                    &lt;br /&gt;
| SpectralHash ||  | near collision || hash || 224,512 || reference impl. || example || - || [http://ehash.iaik.tugraz.at/uploads/2/27/Near_and_truncated_collisions_in_Spectral_Hash_%28shash----%29.txt Enright]&lt;br /&gt;
|-                    &lt;br /&gt;
| SpectralHash ||  | truncated collision || hash || 512 || reference impl. || example || - || [http://ehash.iaik.tugraz.at/uploads/2/27/Near_and_truncated_collisions_in_Spectral_Hash_%28shash----%29.txt Enright]&lt;br /&gt;
|-                    &lt;br /&gt;
| SpectralHash ||  | collision || hash || ? || reference impl. || example || - || [http://ehash.iaik.tugraz.at/uploads/6/64/Spectralhash.txt Bjørstad]&lt;br /&gt;
|-                    &lt;br /&gt;
| StreamHash || style=&amp;quot;background:yellow&amp;quot; | collision || hash || all ||  || n/2*2&amp;lt;sup&amp;gt;n/4&amp;lt;/sup&amp;gt; || ? || [http://lj.streamclub.ru/papers/hash/streamhash.pdf Khovratovich,Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| StreamHash || style=&amp;quot;background:yellow&amp;quot; | preimage || hash || all ||  || n/2*2&amp;lt;sup&amp;gt;n/2&amp;lt;/sup&amp;gt; || ? || [http://lj.streamclub.ru/papers/hash/streamhash.pdf Khovratovich,Nikolić]&lt;br /&gt;
|-                    &lt;br /&gt;
| StreamHash || style=&amp;quot;background:red&amp;quot; | collision || hash || 256 ||  || example || - || [http://ehash.iaik.tugraz.at/uploads/7/7b/Streamhash.txt Bjørstad]&lt;br /&gt;
|-                    &lt;br /&gt;
| Tangle ||  | observation ||  ||  ||  ||  ||  || [http://ehash.iaik.tugraz.at/uploads/c/c9/Tangle_Observation.pdf Esmaeili]&lt;br /&gt;
|-                    &lt;br /&gt;
| Tangle || style=&amp;quot;background:red&amp;quot; | collision || hash || all ||  || example, 2&amp;lt;sup&amp;gt;13&amp;lt;/sup&amp;gt; - 2&amp;lt;sup&amp;gt;28&amp;lt;/sup&amp;gt; || - || [http://www2.mat.dtu.dk/people/S.Thomsen/tangle/tangle-coll.pdf Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| Twister ||  | pseudo collision || compression || all ||  || 2&amp;lt;sup&amp;gt;26.5&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;28&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf Mendel,Rechberger,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| Twister || style=&amp;quot;background:orange&amp;quot; | collision || hash || 512 ||  || 2&amp;lt;sup&amp;gt;252&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf Mendel,Rechberger,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| Twister || style=&amp;quot;background:yellow&amp;quot; | 2nd preimage || hash || 512 ||  || 2&amp;lt;sup&amp;gt;448&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/d/dd/Twister_attack.pdf Mendel,Rechberger,Schläffer]&lt;br /&gt;
|-                    &lt;br /&gt;
| Vortex ||  | observation ||  || all ||  ||  ||  || [http://www.131002.net/data/papers/AD08.pdf Aumasson,Dunkelman]&lt;br /&gt;
|-                    &lt;br /&gt;
| Vortex ||  | pseudo collision || compression || all ||  || 2&amp;lt;sup&amp;gt;n/4&amp;lt;/sup&amp;gt; || - || [http://ehash.iaik.tugraz.at/uploads/5/5c/Vortex_Collisions_and_Preimages_note.txt Knudsen,Mendel,Rechberger,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| Vortex || style=&amp;quot;background:yellow&amp;quot; | preimage || hash || all ||  || 2&amp;lt;sup&amp;gt;3n/4&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;n/4&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/5/5c/Vortex_Collisions_and_Preimages_note.txt Knudsen,Mendel,Rechberger,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| Vortex || style=&amp;quot;background:yellow&amp;quot; | collision || hash || 256 ||  || 2&amp;lt;sup&amp;gt;122.5&amp;lt;/sup&amp;gt; || 2&amp;lt;sup&amp;gt;122.5&amp;lt;/sup&amp;gt; || [http://ehash.iaik.tugraz.at/uploads/5/5c/Vortex_Collisions_and_Preimages_note.txt Knudsen,Mendel,Rechberger,Thomsen]&lt;br /&gt;
|-                    &lt;br /&gt;
| WaMM || style=&amp;quot;background:red&amp;quot; | collision || hash || all ||  || example || - || [http://web.mit.edu/dwilson/www/hash/wamm.html Wilson]&lt;br /&gt;
|-                    &lt;br /&gt;
|}                    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
caption for individual tables:&lt;br /&gt;
&lt;br /&gt;
A dash (-) in the individual table means that the complexities are neglible. A question mark (?) means the information is not given or unclear.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Parameters/Variants&amp;quot; column gives the parameters for attacks on reduced variants. If the column is empty, the attack is on the recommended parameters of the designers.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Type of Analyses&amp;quot; column is left white, if the attack is on reduced variants or parts of the hash function.&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
This looks fine to me. The only editorial aspect I'm a bit unsure of is the inclusion of rejected submissions on the same table; they are only reducing the S/N ratio, since they don't contribute anything to the ongoing SHA-3 process (and hence are not likely to received any further attention at least until the competition is over). I suggest moving them to an appendix table.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=TIB3&amp;diff=2450</id>
		<title>TIB3</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=TIB3&amp;diff=2450"/>
		<updated>2008-11-29T00:14:52Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Fixing the link to TIB3 spec&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Daniel Penazzi, Miguel Montes&lt;br /&gt;
* Website: [http://www.famaf.unc.edu.ar/~penazzi/tib3/ http://www.famaf.unc.edu.ar/~penazzi/tib3/]&lt;br /&gt;
* Specification:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3TIB308,&lt;br /&gt;
  author    = {Miguel Montes and Daniel Penazzi},&lt;br /&gt;
  title     = {The TIB3 Hash},&lt;br /&gt;
  url        = {http://www.famaf.unc.edu.ar/~penazzi/tib3/submitted/Supporting_Documentation/TIB3_Algorithm_Specification.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
* None yet&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=HashFunctions&amp;diff=2445</id>
		<title>HashFunctions</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=HashFunctions&amp;diff=2445"/>
		<updated>2008-11-28T22:28:55Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Changing the status of Panama to broken&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+'''Collection of selected hash functions (in alphabetical order)'''&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;300&amp;quot;| Hash Function Name !! Designer(s) !! Issued in !! Status Cryptanalysis&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/AR AR]                 || ISO || align=&amp;quot;center&amp;quot;|1992 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/Boognish Boognish]     || Daemen || align=&amp;quot;center&amp;quot;|1992 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/Cellhash Cellhash]     || Daemen, Govaerts, Vandewalle || align=&amp;quot;center&amp;quot;|1991 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/FFT-HashI FFT-Hash I]  || Schnorr || align=&amp;quot;center&amp;quot;|1991 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/FFT-HashII FFT-Hash II] || Schnorr || align=&amp;quot;center&amp;quot;|1992 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/FORK256 FORK-256]       || Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee || align=&amp;quot;center&amp;quot;|2006 || &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/FSB FSB]               || Augot, Finiasz, Sendrier || align=&amp;quot;center&amp;quot;|2005 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/GOST GOST R 34.11-94]  || Government Committee of Russia for Standards || align=&amp;quot;center&amp;quot;|1990 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/HAVAL HAVAL]           || Zheng, Pieprzyk, Seberry || align=&amp;quot;center&amp;quot;|1994 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/LASH-n LASH-n]         || Bentahar, Page, Saarinen, Silverman, Smart || align=&amp;quot;center&amp;quot;|2006 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/MD2 MD2]               || Rivest || align=&amp;quot;center&amp;quot;|1989 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/MD4 MD4]               || Rivest || align=&amp;quot;center&amp;quot;|1990 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/MD5 MD5]               || Rivest || align=&amp;quot;center&amp;quot;|1992 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/N-Hash N-Hash]         || Miyaguchi, Ohta, Iwata || align=&amp;quot;center&amp;quot;|1990 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/PANAMA PANAMA]         || Daemen, Clapp || align=&amp;quot;center&amp;quot;|1998 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/ParallelFFT-Hash Parallel FFT-Hash]  || Schnorr, Vaudenay || align=&amp;quot;center&amp;quot;|1993 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/RadioGatun RadioGatun[w]] || Bertoni, Daemen, Peeters, van Assche || align=&amp;quot;center&amp;quot;|2006 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/RIPEMD RIPEMD] || The RIPE Consortium || align=&amp;quot;center&amp;quot;|1990 || broken&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/RIPEMD-128 RIPEMD-128] || Dobbertin, Bosselaers, Preneel || align=&amp;quot;center&amp;quot;|1996 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/RIPEMD-160 RIPEMD-160] || Dobbertin, Bosselaers, Preneel || align=&amp;quot;center&amp;quot;|1996 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SHA0 SHA-0]            || NIST/NSA || align=&amp;quot;center&amp;quot;|1991 || broken &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SHA-1 SHA-1]           || NIST/NSA || align=&amp;quot;center&amp;quot;|1993 || broken/wounded?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SHA-224 SHA-224]       || NIST/NSA || align=&amp;quot;center&amp;quot;|2004 || &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SHA256 SHA-256]        || NIST/NSA || align=&amp;quot;center&amp;quot;|2000 || &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SHA384 SHA-384]        || NIST/NSA || align=&amp;quot;center&amp;quot;|2000 || &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SHA512 SHA-512]        || NIST/NSA || align=&amp;quot;center&amp;quot;|2000 || &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SMASH SMASH]           || Knudsen || align=&amp;quot;center&amp;quot;|2005 || broken &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/Snefru-n Snefru-n]     || Merkle  || align=&amp;quot;center&amp;quot;|1990 || broken &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/StepRightUp StepRightUp] || Daemen  || align=&amp;quot;center&amp;quot;|1995 || wounded &lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/SubHash SubHash]       || Daemen  || align=&amp;quot;center&amp;quot;|1992 || ?&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/Tiger Tiger]       || Anderson, Biham  || align=&amp;quot;center&amp;quot;|1996 || some preliminary results&lt;br /&gt;
|-&lt;br /&gt;
| [http://ehash.iaik.tugraz.at/index.php/Whirlpool Whirlpool]   || Barreto and Rijmen || align=&amp;quot;center&amp;quot;|2000 || ?&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2442</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2442"/>
		<updated>2008-11-28T14:02:32Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: external analysis of Ponic&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[LANE]]                             || submitted || none   || HAIFA/concatenate-permute-truncate or Damg&amp;amp;aring;rd interleaving [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || bounded-height Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2438</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2438"/>
		<updated>2008-11-27T22:32:34Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[LANE]]                             || submitted || none   || HAIFA/concatenate-permute-truncate or Damg&amp;amp;aring;rd interleaving [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || bounded-height Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2437</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2437"/>
		<updated>2008-11-27T22:31:09Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Fixed the categories of Lane and MD6&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Lane]]                             || submitted || none   || HAIFA/concatenate-permute-truncate or Damg&amp;amp;aring;rd interleaving [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || bounded-height Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2436</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2436"/>
		<updated>2008-11-27T22:14:53Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Added JH and Lane, and changed the external analysis of BMW to 'yes'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || yes    || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[JH]]                               || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Lane]]                             || submitted || none   ||&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[NKS2D]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2389</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2389"/>
		<updated>2008-11-25T13:17:04Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Changing FSB and SWIFFTX to 'concatenate-permute-truncate' and WaMM to 'sponge'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || Merkle-Damg&amp;amp;aring;rd/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/concatenate-permute-truncate [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2388</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2388"/>
		<updated>2008-11-25T13:08:33Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Boole]]&amp;lt;/s&amp;gt;                     || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[DCH]]&amp;lt;/s&amp;gt;                       || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[EnRUPT]]&amp;lt;/s&amp;gt;                    || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[HASH 2X]]&amp;lt;/s&amp;gt;                   || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[MCSSHA-3]]&amp;lt;/s&amp;gt;                  || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[Sg&amp;amp;agrave;il]]&amp;lt;/s&amp;gt;              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;[[WaMM]]&amp;lt;/s&amp;gt;                      || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2387</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2387"/>
		<updated>2008-11-25T12:54:45Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Indicating external cryptanalysis for Sarmal&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes    || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sg&amp;amp;agrave;il]]                     || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2386</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2386"/>
		<updated>2008-11-25T12:51:12Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Labeling DCH as broken&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sg&amp;amp;agrave;il]]                     || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2382</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2382"/>
		<updated>2008-11-25T00:20:31Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Changed the CRUNCH category to 'concatenate-permute-truncate'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || concatenate-permute-truncate [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sg&amp;amp;agrave;il]]                     || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2381</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2381"/>
		<updated>2008-11-25T00:11:50Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Setting Boole to 'broken' and Gr&amp;amp;oslash;stl to 'yes'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || yes    || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || &amp;amp;#9760;|| streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || &amp;amp;#9760;|| streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || &amp;amp;#9760;|| cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sg&amp;amp;agrave;il]]                     || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || &amp;amp;#9760;|| Merkle-Damg&amp;amp;aring;rd? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I'm a bit unsure about the nature of a &amp;quot;sponge&amp;quot; hash. Sometimes the message is inserted via a group operation like XOR or addition mod 2^n; sometimes (à la Snefru) it's concatenated with the state or replaces part of it, hence it's irreversible. The behavior against attacks may be different in the two cases even though the difference is superficially small. Yet I wouldn't like to establish too fine distinctions if they are not necessary. Opinions?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2377</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2377"/>
		<updated>2008-11-23T21:14:01Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || none   || Merkle-Damg&amp;amp;aring;rd/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Gr&amp;amp;oslash;stl]]            || submitted || none   || sponge? Merkle-Damg&amp;amp;aring;rd/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sg&amp;amp;agrave;il]]                     || submitted || broken || Merkle-Damg&amp;amp;aring;rd/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damg&amp;amp;aring;rd/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damg&amp;amp;aring;rd/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || Merkle-Damg&amp;amp;aring;rd? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I'm a bit unsure about the nature of a &amp;quot;sponge&amp;quot; hash. Sometimes the message is inserted via a group operation like XOR or addition mod 2^n; sometimes (à la Snefru) it's concatenated with the state or replaces part of it, hence it's irreversible. The behavior against attacks may be different in the two cases even though the difference is superficially small. Yet I wouldn't like to establish too fine distinctions if they are not necessary. Opinions?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2376</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2376"/>
		<updated>2008-11-23T19:40:28Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;acirc;aard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || none   || Merkle-Damg&amp;amp;acirc;aard/Miyaguchi-Preneel [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge? Merkle-Damgaard/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || Merkle-Damgaard? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I'm a bit unsure about the nature of a &amp;quot;sponge&amp;quot; hash. Sometimes the message is inserted via a group operation like XOR or addition mod 2^n; sometimes (à la Snefru) it's concatenated with the state or replaces part of it, hence it's irreversible. The behavior against attacks may be different in the two cases even though the difference is superficially small. Yet I wouldn't like to establish too fine distinctions if they are not necessary. Opinions?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2375</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2375"/>
		<updated>2008-11-23T19:30:34Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Adding DCH (with *that* S-box, I don't think it will live long, though)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damg&amp;amp;acirc;aard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[DCH]]                              || submitted || none   || Merkle-Damg&amp;amp;acirc;aard/Miyaguchi-Preneel&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge? Merkle-Damgaard/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || Merkle-Damgaard? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I'm a bit unsure about the nature of a &amp;quot;sponge&amp;quot; hash. Sometimes the message is inserted via a group operation like XOR or addition mod 2^n; sometimes (à la Snefru) it's concatenated with the state or replaces part of it, hence it's irreversible. The behavior against attacks may be different in the two cases even though the difference is superficially small. Yet I wouldn't like to establish too fine distinctions if they are not necessary. Opinions?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2370</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2370"/>
		<updated>2008-11-21T19:36:00Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damgaard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge? Merkle-Damgaard/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || Merkle-Damgaard? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
I'm a bit unsure about the nature of a &amp;quot;sponge&amp;quot; hash. Sometimes the message is inserted via a group operation like XOR or addition mod 2^n; sometimes (à la Snefru) it's concatenated with the state or replaces part of it, hence it's irreversible. The behavior against attacks may be different in the two cases even though the difference is superficially small. Yet I wouldn't like to establish too fine distinctions if they are not necessary. Opinions?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=The_SHA-3_Zoo&amp;diff=2369</id>
		<title>The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=The_SHA-3_Zoo&amp;diff=2369"/>
		<updated>2008-11-21T14:24:50Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
At this time, 29 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 7 submissions have been broken).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your submission is not on this list? Drop a line at sha3zoo@iaik.tugraz.at to let us know!&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Groestl&amp;diff=2368</id>
		<title>Groestl</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Groestl&amp;diff=2368"/>
		<updated>2008-11-21T14:24:27Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: added &amp;quot;An observation on Grøstl&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen&lt;br /&gt;
* Website: [http://www.groestl.info http://www.groestl.info] &lt;br /&gt;
* Specification: [http://www.groestl.info/specification.html http://www.groestl.info/specification.html]&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3groestl,&lt;br /&gt;
  author    = {Praveen Gauravaram and Lars R. Knudsen and Krystian Matusiewicz and Florian Mendel and Christian Rechberger and Martin Schläffer and Søren S. Thomsen},&lt;br /&gt;
  title     = {Grøstl -- a SHA-3 candidate},&lt;br /&gt;
  url        = {http://www.groestl.info/Groestl.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
* P. S. L. M. Barreto, An observation on Grøstl. Details: [http://www.larc.usp.br/~pbarreto/Grizzly.pdf here]&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:Boole&amp;diff=2363</id>
		<title>Talk:Boole</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:Boole&amp;diff=2363"/>
		<updated>2008-11-21T10:37:56Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Greg Rose posted this to the NIST forum:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
I'm just back from vacation, but I can confirm that (with minor  &lt;br /&gt;
tweaks and a slight increase in complexity) this attack works. Rats.  &lt;br /&gt;
I believe a simple fix is possible, and after sleeping on it for a  &lt;br /&gt;
few weeks will probably release a new version, but for the purposes  &lt;br /&gt;
of NIST, I think my submission is dead.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does this mean we can label this submission &amp;quot;broken&amp;quot; on the SHA-3 Zoo page?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2362</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2362"/>
		<updated>2008-11-20T18:06:20Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Adding some information on pipe width&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damgaard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge? Merkle-Damgaard/Davies-Meyer? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI? Merkle tree? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism? [narrow pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA/? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || Merkle-Damgaard? sponge? [wide pipe]&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2360</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2360"/>
		<updated>2008-11-20T11:16:47Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Added SWIFFTX and fixed a copy&amp;amp;paste error for Edon-R&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/?&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damgaard/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI?&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism?&lt;br /&gt;
|-&lt;br /&gt;
| [[SWIFFTX]]                          || submitted || none   || HAIFA&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block?&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
We can follow Orr and say that &amp;quot;everything is HAIFA&amp;quot; ;)&lt;br /&gt;
&lt;br /&gt;
More seriously: more info would of course be valuable, but accurate information seems in this case difficult (and maybe impossible) to provide. All the functions are based on a compression function (whatever the designers say to sound original), then the variations are: how the iteration is performed? (linear or tree), how large is the state?, how many rounds are recommended and how many are broken? (it would be interesting to give this ratio, but often there's more than the &amp;quot;round&amp;quot; parameter, see eg CubeHash), are there additional inputs? (salt, key, counter, etc.). &lt;br /&gt;
&lt;br /&gt;
The iteration mode seems to be linear in most of the submissions, so providing this info may not be that useful. However it could be interesting and easy to add a column &amp;quot;state bitsize&amp;quot;. If we want to say how many rounds are broken, we'll reduce to the same problem as we have with the &amp;quot;external cryptanalysis&amp;quot; column with &amp;quot;what is broken&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
JP&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2357</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2357"/>
		<updated>2008-11-20T00:18:25Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/?&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damgaard/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI?&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism?&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block?&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I'm in favour of adding more infos to this page. Seems like a good first shot. But surely we have to put a disclaimer to this category saying something like &amp;quot;this column can never we entirely correct as we would need almost 64 categories...&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regarding your current categorization. Why not distinguish designs that are based on a small number of permutations from designs based on a huge number of permutations (e.g. block-cipher based). This seems a crucial difference to me. &lt;br /&gt;
On the other hand, do we really want to distinguish HAIFA from Merkle-Damgaard? The former is an extension of the later. &lt;br /&gt;
Also, what is your way to distinguish between sponge and streaming?&lt;br /&gt;
&lt;br /&gt;
-Christian&lt;br /&gt;
&lt;br /&gt;
Oh, I'm definitely thinking about adding a disclaimer. Regarding HAIFA vs. MD, I wrote HAIFA when the authors explicitly state so in the documentation. I tend to call &amp;quot;sponge&amp;quot; a construction that inserts a message in &amp;quot;blocks&amp;quot; (related to the abstract design) in a &amp;quot;simple&amp;quot; way (e.g. via some block-oriented group operation), and &amp;quot;stream&amp;quot; a construction oriented toward &amp;quot;words&amp;quot; (related to popular target platforms) mixed into the state through a &amp;quot;complicated&amp;quot; operation (I admit this is rather informal to say the least); also, I again adhere to the authors' statement when they claim a design is streaming. As for permutations vs. block ciphers, I've been thinking about this... but perhaps it's better to discuss the subject privately before, so I can check my own understanding of a few concepts. And of course I'm entirely open to revising a classification if there is evidence of a mistaken prior assessment.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2345</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2345"/>
		<updated>2008-11-18T22:48:53Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
Addendum: as far as I could tell, the overall structure of the currently known proposals &amp;lt;b&amp;gt;seems&amp;lt;/b&amp;gt; to be the following (disclaimer: I may be completely mistaken in many cases):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]!! width=&amp;quot;150&amp;quot;| Tentative Classification&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none   || HAIFA/?&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes    || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none   || Merkle-Damgaard/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || yes    || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes    || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none   || Merkle tree&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken || streaming?&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes    || Merkle tree&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none   || sponge?&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken || cellular automaton&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none   || streaming&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none   || HAIFA/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken || Merkle-Damgaard/Davies-Meyer&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none   || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none   || Merkle-Damgaard/UBI?&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes    || Merkle-Damgaard/prism?&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes    || Merkle-Damgaard/Vortex-block?&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken || sponge&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none   || streaming&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:Spectral_Hash&amp;diff=2344</id>
		<title>Talk:Spectral Hash</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:Spectral_Hash&amp;diff=2344"/>
		<updated>2008-11-18T20:27:31Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;According to NIST's [http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf FR call] (section 4.A), it seems that Brandon Enright's partial collisions &amp;lt;i&amp;gt;do&amp;lt;/i&amp;gt; break Spectral Hash. The relevant text is this:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;NIST expects the SHA–3 algorithm of message digest size &amp;lt;i&amp;gt;n&amp;lt;/i&amp;gt; to meet the following security requirements at a minimum. [...] any result that shows that the candidate algorithm does not meet these requirements will be considered to be a serious attack. [...] Any &amp;lt;i&amp;gt;m&amp;lt;/i&amp;gt;-bit hash function specified by taking a fixed subset of the candidate function's output bits is expected to meet the above requirements with &amp;lt;i&amp;gt;m&amp;lt;/i&amp;gt; replacing &amp;lt;i&amp;gt;n&amp;lt;/i&amp;gt;.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Should Spectral Hash be labeled broken, then?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2343</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2343"/>
		<updated>2008-11-18T15:28:45Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;br /&gt;
&lt;br /&gt;
I think this would be a lot of effort for a relatively minor added value; as you observe, many candidates are likely to use &amp;quot;uncategorizable&amp;quot; modes of operations. How one would classify CubeHash? It has similarities with a sponge constructions, but is not a sponge in general. Also, both MD6 and ESSENCE have a tree construction, but with different arities, parameters, etc. Finding the best tradeoff precision/readability seems difficult...&lt;br /&gt;
&lt;br /&gt;
JP&lt;br /&gt;
&lt;br /&gt;
Well, I don't see it as too much effort -- for &amp;lt;i&amp;gt;me&amp;lt;/i&amp;gt; at any rate; I'm not asking that somebody else do the hard work &amp;amp;#9786;. Rather, I think it's part of trying to understand how each submission works, and it could also suggest lines of attack (particularly where the actual functions deviate from previously analyzed constructions). Besides, in cases where the authors disagree of a tentative category it might shed new light on those authors' original intent.&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=User:PBarreto&amp;diff=2340</id>
		<title>User:PBarreto</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=User:PBarreto&amp;diff=2340"/>
		<updated>2008-11-18T14:18:00Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.larc.usp.br/~pbarreto Paulo Barreto]&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=User:PBarreto&amp;diff=2339</id>
		<title>User:PBarreto</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=User:PBarreto&amp;diff=2339"/>
		<updated>2008-11-18T14:16:29Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;http://www.larc.usp.br/~pbarreto&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2335</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2335"/>
		<updated>2008-11-18T13:22:13Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;br /&gt;
&lt;br /&gt;
Paulo.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2334</id>
		<title>Talk:The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Talk:The_SHA-3_Zoo&amp;diff=2334"/>
		<updated>2008-11-18T13:21:12Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm thinking about introducing another column to the list of submissions to provide a rough, overall classification of the candidates (e.g. classical Merkle-Damgaard vs. HAIFA vs. sponge vs. tree-based vs. streaming vs. ...), motivated by private messages I've got comparing the current SHA-3 Zoo with my old hash lounge.&lt;br /&gt;
&lt;br /&gt;
However, finding the most appropriate category for some submissions may be a tough task; paradigms may be so distorted as to be nearly unrecognizable. Still, other candidates exhibit a much more transparent structure, and I think this information may be useful (e.g. comparing submissions that fall on distinct categories may not be as fair as comparing functions that share a high-level structure).&lt;br /&gt;
&lt;br /&gt;
Would such a modification be welcome to the SHA-3 Zoo contributors?&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=The_SHA-3_Zoo&amp;diff=2333</id>
		<title>The SHA-3 Zoo</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=The_SHA-3_Zoo&amp;diff=2333"/>
		<updated>2008-11-18T13:02:54Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Added ref to &amp;quot;Near and truncated collisions in Spectral Hash&amp;quot; by Brandon Enright&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The SHA-3 Zoo is a collection of cryptographic hash functions (in alphabetical order) submitted to the [http://www.nist.gov/hash-competition SHA-3 contest] (work in progress). It aims to provide an overview of design and cryptanalysis of all submissions. A list of all [[SHA-3 submitters]] is also available. For a software performance related overview, see [http://bench.cr.yp.to/ebash.html eBASH]. At a separate page, we also collect [[SHA-3_Hardware_Implementations | hardware implementation results]] of the candidates.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
At this time, 28 out of 64 submissions to the SHA-3 competition are publicly known and available, and hence take advantage of early external cryptanalysis (so far, 6 submissions have been broken).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;4&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|- style=&amp;quot;background:#efefef;&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot;| Hash Function Name      !! width=&amp;quot;150&amp;quot;| Status    !!  width=&amp;quot;150&amp;quot;| [[External Cryptanalysis Categories| External Cryptanalysis]]&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Blue Midnight Wish]]               || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Boole]]                            || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[CHI]]                              || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[CRUNCH]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[CubeHash]]                         || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Edon-R (SHA-3 submission)|Edon-R]] || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[EnRUPT]]                           || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[ESSENCE]]                          || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[FSB (SHA-3 submission) | FSB]]     || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Fugue]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Groestl|Grøstl]]                   || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[HASH 2X]]                          || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[Keccak]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Maraca]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[MCSSHA-3]]                         || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]                              || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[NaSHA]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[NKS2D]]                            || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[Ponic]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Sarmal]]                           || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Sgàil]]                            || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[SHAMATA]]                          || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Skein]]                            || submitted || none&lt;br /&gt;
|-&lt;br /&gt;
| [[Spectral Hash]]                    || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[Vortex (SHA-3 submission)|Vortex]] || submitted || yes&lt;br /&gt;
|-&lt;br /&gt;
| [[WaMM]]                             || submitted || broken&lt;br /&gt;
|-&lt;br /&gt;
| [[Waterfall]]                        || submitted || none&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Your submission is not on this list? Drop a line at sha3zoo@iaik.tugraz.at to let us know!&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=Spectral_Hash&amp;diff=2332</id>
		<title>Spectral Hash</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=Spectral_Hash&amp;diff=2332"/>
		<updated>2008-11-18T13:01:13Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Near and truncated collisions in Spectral Hash, by Brandon Enright&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The algorithm ==&lt;br /&gt;
&lt;br /&gt;
* Author(s): Gokay Saldamlı, Cevahir Demirkıran, Megan Maguire, Carl Minden, Jacob Topper, Alex Troesch, Cody Walker, Çetin Kaya Koç&lt;br /&gt;
&lt;br /&gt;
* Website: [http://www.cs.ucsb.edu/~koc/shash/index.html http://www.cs.ucsb.edu/~koc/shash/index.html] &lt;br /&gt;
* Specification: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@misc{sha3Saldamli+08,&lt;br /&gt;
  author    = {Gokay Saldamlı, Cevahir Demirkıran, Megan Maguire, Carl Minden, Jacob Topper, Alex Troesch, Cody Walker, Çetin Kaya Koç},&lt;br /&gt;
  title     = {Spectral Hash},&lt;br /&gt;
  url        = {http://www.cs.ucsb.edu/~koc/shash/sHash.pdf},&lt;br /&gt;
  howpublished = {Submission to NIST},&lt;br /&gt;
  year      = {2008},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
Brandon Enright: Near and truncated collisions in Spectral Hash (shash-###),&lt;br /&gt;
[http://ehash.iaik.tugraz.at/uploads/2/27/Near_and_truncated_collisions_in_Spectral_Hash_%28shash----%29.txt  Local link]&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=File:Near_and_truncated_collisions_in_Spectral_Hash_(shash----).txt&amp;diff=2331</id>
		<title>File:Near and truncated collisions in Spectral Hash (shash----).txt</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=File:Near_and_truncated_collisions_in_Spectral_Hash_(shash----).txt&amp;diff=2331"/>
		<updated>2008-11-18T12:59:33Z</updated>

		<summary type="html">&lt;p&gt;PBarreto: Near and truncated collisions in Spectral Hash. NIST SHA-3 forum communication by Brandon Enright.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Near and truncated collisions in Spectral Hash. NIST SHA-3 forum communication by Brandon Enright.&lt;/div&gt;</summary>
		<author><name>PBarreto</name></author>
		
	</entry>
</feed>