Difference between revisions of "Skein"
From The ECRYPT Hash Function Website
m (→The algorithm)  | 
				m (Added results on Threefish)  | 
				||
| Line 18: | Line 18: | ||
== Cryptanalysis ==  | == Cryptanalysis ==  | ||
| − | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center"                     | |
| + | |- style="background:#efefef;"                     | ||
| + | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements ||   Reference   | ||
| + | |-  | ||
| + | |-       | ||
| + | |  near collision || block cipher || 512 || 17 rounds || 2<sup>24</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan]  | ||
| + | |-       | ||
| + | |  distinguisher || block cipher || 512 || 17 rounds || 2<sup>4</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan]  | ||
| + | |-   | ||
| + | |  impossible differential || block cipher || 512 || 21 rounds || - || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan]  | ||
| + | |-      | ||
| + | |  key recovery || block cipher || 512 || 23 rounds || 2<sup>274</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan]  | ||
| + | |-    | ||
| + | |  key recovery || block cipher || 512 || 24 rounds || 2<sup>431</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan]  | ||
| + | |-         | ||
| + | |  key recovery || block cipher || 512 || 25 rounds || 2<sup>441</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan]  | ||
| + | |-             | ||
| + | |}          | ||
| + | |||
| + | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here].  | ||
| + | |||
| + | |||
| + | <bibtex>  | ||
| + | @misc{SkeinAum09,  | ||
| + |   author    = {Jean-Philippe Aumasson and Willi Meier and Raphael Phan},  | ||
| + |   title     = {Improved analyis of Threefish},  | ||
| + |   url = {http://131002.net/data/talks/threefish_rump.pdf},  | ||
| + |   howpublished = {FSE 2009 rump session, slides available online},  | ||
| + |   year = {2009},  | ||
| + | }  | ||
| + | </bibtex>  | ||
Revision as of 13:20, 3 March 2009
1 The algorithm
- Author(s): Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker
 - Website: http://www.schneier.com/skein.html; http://skein-hash.info/
 - NIST submission package: Skein.zip
 - Specification:
 
Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - The Skein Hash Function Family
- ,2008
 - http://www.schneier.com/skein.pdf
BibtexAuthor : Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker
Title : The Skein Hash Function Family
In : -
Address :
Date : 2008 
2 Cryptanalysis
| Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference | 
| near collision | block cipher | 512 | 17 rounds | 224 | - | Aumasson,Meier,Phan | 
| distinguisher | block cipher | 512 | 17 rounds | 24 | - | Aumasson,Meier,Phan | 
| impossible differential | block cipher | 512 | 21 rounds | - | - | Aumasson,Meier,Phan | 
| key recovery | block cipher | 512 | 23 rounds | 2274 | - | Aumasson,Meier,Phan | 
| key recovery | block cipher | 512 | 24 rounds | 2431 | - | Aumasson,Meier,Phan | 
| key recovery | block cipher | 512 | 25 rounds | 2441 | - | Aumasson,Meier,Phan | 
A description of this table is given here.
Jean-Philippe Aumasson, Willi Meier, Raphael Phan - Improved analyis of Threefish