Difference between revisions of "Hamsi"
From The ECRYPT Hash Function Website
Mschlaeffer (talk | contribs) (link to updated reference implementation added) |
Mschlaeffer (talk | contribs) (analy) |
||
| Line 23: | Line 23: | ||
|- style="background:#efefef;" | |- style="background:#efefef;" | ||
| Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
| − | |- | + | |- |
| | non-randomness || compression function || 224, 256 || 5 rounds || || || [http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt Aumasson] | | | non-randomness || compression function || 224, 256 || 5 rounds || || || [http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt Aumasson] | ||
| − | |- | + | |- |
| − | |} | + | | | near-collision || compression function || 224, 256 || 3 rounds || 2<sup>21</sup> || || [http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf Nikolic] |
| + | |- | ||
| + | |} | ||
A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
| − | |||
| Line 38: | Line 39: | ||
url = {http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt}, | url = {http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt}, | ||
howpublished = {NIST mailing list (local link)} | howpublished = {NIST mailing list (local link)} | ||
| + | year = {2009}, | ||
| + | </bibtex> | ||
| + | |||
| + | <bibtex> | ||
| + | @misc{hamsiN09, | ||
| + | author = {Ivica Nikolic}, | ||
| + | title = {Near Collisions for the Compression Function of Hamsi-256}, | ||
| + | url = {http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf}, | ||
| + | howpublished = {CRYPTO rump session} | ||
year = {2009}, | year = {2009}, | ||
</bibtex> | </bibtex> | ||
Revision as of 19:34, 14 September 2009
1 The algorithm
- Author(s): Özgül Kücük
- Website: http://homes.esat.kuleuven.be/~okucuk/hamsi/
- NIST submission package: Hamsi.zip, HamsiUpdate.zip
- an updated reference implementation can be found here (Hamsi website)
Özgül Kücük - The Hash Function Hamsi
- ,2008
- http://ehash.iaik.tugraz.at/uploads/9/95/Hamsi.pdf
BibtexAuthor : Özgül Kücük
Title : The Hash Function Hamsi
In : -
Address :
Date : 2008
2 Cryptanalysis
| Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
| non-randomness | compression function | 224, 256 | 5 rounds | Aumasson | ||
| near-collision | compression function | 224, 256 | 3 rounds | 221 | Nikolic |
A description of this table is given here.
Jean-Philippe Aumasson - On the pseudorandomness of Hamsi
- ,2009
- http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt
BibtexAuthor : Jean-Philippe Aumasson
Title : On the pseudorandomness of Hamsi
In : -
Address :
Date : 2009
Ivica Nikolic - Near Collisions for the Compression Function of Hamsi-256