Difference between revisions of "Hamsi"
From The ECRYPT Hash Function Website
| Mschlaeffer (talk | contribs)  (analy) | Mschlaeffer (talk | contribs)   (analysis updated) | ||
| Line 27: | Line 27: | ||
| |- | |- | ||
| |   | near-collision || compression function || 224, 256 || 3 rounds || 2<sup>21</sup> ||  || [http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf Nikolic] | |   | near-collision || compression function || 224, 256 || 3 rounds || 2<sup>21</sup> ||  || [http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf Nikolic] | ||
| + | |- | ||
| + | |   | non-randomness || compression function || 224, 256 || 6 rounds || 2<sup>27</sup> ||  || [http://www.131002.net/data/papers/AM09.pdf Aumasson,Meier] | ||
| + | |- | ||
| + | |   | non-randomness || compression function || 224, 256 || 12 rounds || 2<sup>729</sup> ||  || [http://www.131002.net/data/papers/AM09.pdf Aumasson,Meier] | ||
| |- | |- | ||
| |} | |} | ||
| Line 48: | Line 52: | ||
|    url        = {http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf}, |    url        = {http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf}, | ||
|    howpublished = {CRYPTO rump session} |    howpublished = {CRYPTO rump session} | ||
| + |   year      = {2009}, | ||
| + | </bibtex> | ||
| + | |||
| + | <bibtex> | ||
| + | @misc{hamsiAM9, | ||
| + |   author    = {Jean-Philippe Aumasson and Willi Meier}, | ||
| + |   title     = {Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi}, | ||
| + |   url        = {http://www.131002.net/data/papers/AM09.pdf}, | ||
| + |   howpublished = {NIST mailing list} | ||
|    year      = {2009}, |    year      = {2009}, | ||
| </bibtex> | </bibtex> | ||
Revision as of 19:38, 14 September 2009
1 The algorithm
- Author(s): Özgül Kücük
- Website: http://homes.esat.kuleuven.be/~okucuk/hamsi/
- NIST submission package: Hamsi.zip, HamsiUpdate.zip
- an updated reference implementation can be found here (Hamsi website)
Özgül Kücük - The Hash Function Hamsi
- ,2008
- http://ehash.iaik.tugraz.at/uploads/9/95/Hamsi.pdf
 BibtexAuthor : Özgül Kücük
 Title : The Hash Function Hamsi
 In : -
 Address :
 Date : 2008
2 Cryptanalysis
| Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference | 
| non-randomness | compression function | 224, 256 | 5 rounds | Aumasson | ||
| near-collision | compression function | 224, 256 | 3 rounds | 221 | Nikolic | |
| non-randomness | compression function | 224, 256 | 6 rounds | 227 | Aumasson,Meier | |
| non-randomness | compression function | 224, 256 | 12 rounds | 2729 | Aumasson,Meier | 
A description of this table is given here.
Jean-Philippe Aumasson - On the pseudorandomness of Hamsi
- ,2009
- http://ehash.iaik.tugraz.at/uploads/d/db/Hamsi_nonrandomness.txt
 BibtexAuthor : Jean-Philippe Aumasson
 Title : On the pseudorandomness of Hamsi
 In : -
 Address :
 Date : 2009
Ivica Nikolic - Near Collisions for the Compression Function of Hamsi-256
- ,2009
- http://rump2009.cr.yp.to/936779b3afb9b48a404b487d6865091d.pdf
 BibtexAuthor : Ivica Nikolic
 Title : Near Collisions for the Compression Function of Hamsi-256
 In : -
 Address :
 Date : 2009
Jean-Philippe Aumasson, Willi Meier - Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi
