Difference between revisions of "ARIRANG"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) m |
Crechberger (talk | contribs) (Practical compression function attacks on Arirang) |
||
| Line 21: | Line 21: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
| − | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | |
| + | |- style="background:#efefef;" | ||
| + | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
| + | |- | ||
| + | | | collision|| reduced compression || 256/512 || 26 steps || 1 || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
| + | |- | ||
| + | | | near-collision|| compression || 256/512 || full || 1 || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
| + | |- | ||
| + | | | pseudo-collision|| hash|| 224|| full || 2<sup>23</sup> || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
| + | |- | ||
| + | | | pseudo-collision|| hash|| 384|| full || 1 || - || [http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf Guo, Matusiewicz, Knudsen, Ling, Wang] | ||
| + | |- | ||
| + | |||
| + | |} | ||
| + | |||
| + | |||
| + | |||
| + | <bibtex> | ||
| + | @misc{ArirangGMKLW09, | ||
| + | author = {Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, and | ||
| + | Huaxiong Wan}, | ||
| + | title = {Practical pseudo-collisions for hash functions | ||
| + | ARIRANG-224/384}, | ||
| + | url = {http://ehash.iaik.tugraz.at/uploads/9/9a/Arirang-pseudo-sha3zoo.pdf }, | ||
| + | howpublished = {Available online}, | ||
| + | year = {2009}, | ||
| + | </bibtex> | ||
Revision as of 15:24, 30 March 2009
1 The algorithm
- Author(s): Donghoon Chang, Seokhie Hong, Changheon Kang, Jinkeon Kang, Jongsung Kim, Changhoon Lee, Jesang Lee, Jongtae Lee, Sangjin Lee, Yuseop Lee, Jongin Lim, Jaechul Sung
- NIST submission package: ARIRANG.zip
Donghoon Chang, Seokhie Hong, Changheon Kang, Jinkeon Kang, Jongsung Kim, Changhoon Lee, Jesang Lee, Jongtae Lee, Sangjin Lee, Yuseop Lee, Jongin Lim, Jaechul Sung - ARIRANG
- ,2008
- http://ehash.iaik.tugraz.at/uploads/2/2c/Arirang.pdf
BibtexAuthor : Donghoon Chang, Seokhie Hong, Changheon Kang, Jinkeon Kang, Jongsung Kim, Changhoon Lee, Jesang Lee, Jongtae Lee, Sangjin Lee, Yuseop Lee, Jongin Lim, Jaechul Sung
Title : ARIRANG
In : -
Address :
Date : 2008
2 Cryptanalysis
| Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
| collision | reduced compression | 256/512 | 26 steps | 1 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
| near-collision | compression | 256/512 | full | 1 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
| pseudo-collision | hash | 224 | full | 223 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
| pseudo-collision | hash | 384 | full | 1 | - | Guo, Matusiewicz, Knudsen, Ling, Wang |
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling,, Huaxiong Wan - Practical pseudo-collisions for hash functions
ARIRANG-224/384