Difference between revisions of "Vortex"
From The ECRYPT Hash Function Website
(→Specification) |
Crechberger (talk | contribs) (Update on Vortex) |
||
| Line 27: | Line 27: | ||
=== Best Known Results === | === Best Known Results === | ||
| − | + | Collision attacks and distinguishing attacks were found. | |
---- | ---- | ||
| Line 36: | Line 36: | ||
=== Collision Attacks === | === Collision Attacks === | ||
| + | A collision attack is described in | ||
| + | <bibtex> | ||
| + | @inproceedings{ADMRT09, | ||
| + | author = {Jean-Philippe Aumasson and Orr Dunkelman and Florian Mendel and Christian Rechberger and Søren S. Thomsen}, | ||
| + | title = {Cryptanalysis of Vortex}, | ||
| + | booktitle = {AFRICACRYPT}, | ||
| + | year = {2009}, | ||
| + | publisher = {Springer}, | ||
| + | editor = {Bart Preneel}, | ||
| + | series = {LNCS}, | ||
| + | pages = {14-28}, | ||
| + | volume = {5580}, | ||
| + | url = {http://www.131002.net/data/papers/ADMRT09.pdf}, | ||
| + | abstract = {Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.}, | ||
| + | } | ||
| + | </bibtex> | ||
---- | ---- | ||
| − | |||
---- | ---- | ||
=== Preimage Attacks === | === Preimage Attacks === | ||
| + | |||
| Line 49: | Line 65: | ||
=== Others === | === Others === | ||
| + | A distinguisher is described in | ||
| + | <bibtex> | ||
| + | @inproceedings{ADMRT09, | ||
| + | author = {Jean-Philippe Aumasson and Orr Dunkelman and Florian Mendel and Christian Rechberger and Søren S. Thomsen}, | ||
| + | title = {Cryptanalysis of Vortex}, | ||
| + | booktitle = {AFRICACRYPT}, | ||
| + | year = {2009}, | ||
| + | publisher = {Springer}, | ||
| + | editor = {Bart Preneel}, | ||
| + | series = {LNCS}, | ||
| + | pages = {14-28}, | ||
| + | volume = {5580}, | ||
| + | url = {http://www.131002.net/data/papers/ADMRT09.pdf}, | ||
| + | abstract = {Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.}, | ||
| + | } | ||
| + | </bibtex> | ||
Latest revision as of 14:50, 30 July 2009
Contents
1 Specification
- digest size: 256 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 256-bit chaining variable
- Specification:
Shay Gueron, Michael E. Kounavis - Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
- ISC 5222:331-340,2008
- http://dx.doi.org/10.1007/978-3-540-85886-7_23
BibtexAuthor : Shay Gueron, Michael E. Kounavis
Title : Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication
In : ISC -
Address :
Date : 2008
2 Cryptanalysis
2.1 Best Known Results
Collision attacks and distinguishing attacks were found.
2.2 Generic Attacks
2.3 Collision Attacks
A collision attack is described in
Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen - Cryptanalysis of Vortex
- AFRICACRYPT 5580:14-28,2009
- http://www.131002.net/data/papers/ADMRT09.pdf
BibtexAuthor : Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
Title : Cryptanalysis of Vortex
In : AFRICACRYPT -
Address :
Date : 2009
2.4 Preimage Attacks
2.5 Others
A distinguisher is described in
Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen - Cryptanalysis of Vortex