Difference between revisions of "Skein"
From The ECRYPT Hash Function Website
m (→The algorithm) |
m (Added results on Threefish) |
||
| Line 18: | Line 18: | ||
== Cryptanalysis == | == Cryptanalysis == | ||
| − | + | {| border="1" cellpadding="4" cellspacing="0" class="wikitable" style="text-align:center" | |
| + | |- style="background:#efefef;" | ||
| + | | Type of Analysis || Hash Function Part || Hash Size (n) || Parameters/Variants || Compression Function Calls || Memory Requirements || Reference | ||
| + | |- | ||
| + | |- | ||
| + | | near collision || block cipher || 512 || 17 rounds || 2<sup>24</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan] | ||
| + | |- | ||
| + | | distinguisher || block cipher || 512 || 17 rounds || 2<sup>4</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan] | ||
| + | |- | ||
| + | | impossible differential || block cipher || 512 || 21 rounds || - || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan] | ||
| + | |- | ||
| + | | key recovery || block cipher || 512 || 23 rounds || 2<sup>274</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan] | ||
| + | |- | ||
| + | | key recovery || block cipher || 512 || 24 rounds || 2<sup>431</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan] | ||
| + | |- | ||
| + | | key recovery || block cipher || 512 || 25 rounds || 2<sup>441</sup> || - || [http://131002.net/data/talks/threefish_rump.pdf Aumasson,Meier,Phan] | ||
| + | |- | ||
| + | |} | ||
| + | |||
| + | A description of this table is given [http://ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories#Individual_Hash_Function_Tables here]. | ||
| + | |||
| + | |||
| + | <bibtex> | ||
| + | @misc{SkeinAum09, | ||
| + | author = {Jean-Philippe Aumasson and Willi Meier and Raphael Phan}, | ||
| + | title = {Improved analyis of Threefish}, | ||
| + | url = {http://131002.net/data/talks/threefish_rump.pdf}, | ||
| + | howpublished = {FSE 2009 rump session, slides available online}, | ||
| + | year = {2009}, | ||
| + | } | ||
| + | </bibtex> | ||
Revision as of 13:20, 3 March 2009
1 The algorithm
- Author(s): Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker
- Website: http://www.schneier.com/skein.html; http://skein-hash.info/
- NIST submission package: Skein.zip
- Specification:
Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - The Skein Hash Function Family
- ,2008
- http://www.schneier.com/skein.pdf
BibtexAuthor : Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker
Title : The Skein Hash Function Family
In : -
Address :
Date : 2008
2 Cryptanalysis
| Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
| near collision | block cipher | 512 | 17 rounds | 224 | - | Aumasson,Meier,Phan |
| distinguisher | block cipher | 512 | 17 rounds | 24 | - | Aumasson,Meier,Phan |
| impossible differential | block cipher | 512 | 21 rounds | - | - | Aumasson,Meier,Phan |
| key recovery | block cipher | 512 | 23 rounds | 2274 | - | Aumasson,Meier,Phan |
| key recovery | block cipher | 512 | 24 rounds | 2431 | - | Aumasson,Meier,Phan |
| key recovery | block cipher | 512 | 25 rounds | 2441 | - | Aumasson,Meier,Phan |
A description of this table is given here.
Jean-Philippe Aumasson, Willi Meier, Raphael Phan - Improved analyis of Threefish