Abstract
In this paper, we analyze SHAvite-3-512 hash function, as proposed for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of $2^{497}$ compression function evaluations and $2^{16}$ memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with $2^{384}$ compression function evaluations and $2^{128}$ memory (or complexity $2^{448}$ without memory), and a collision attack with $2^{192}$ compression function evaluations and $2^{128}$ memory.
| Original language | English |
|---|---|
| Book series | Lecture Notes in Computer Science |
| Volume | 6055 |
| Pages (from-to) | 419-436 |
| ISSN | 0302-9743 |
| DOIs | |
| Publication status | Published - 2010 |
| Event | Third International Conference on Cryptology in Africa - Stellenbosch, South Africa Duration: 3 May 2010 → 6 May 2010 Conference number: 3 |
Conference
| Conference | Third International Conference on Cryptology in Africa |
|---|---|
| Number | 3 |
| Country/Territory | South Africa |
| City | Stellenbosch |
| Period | 03/05/2010 → 06/05/2010 |
Keywords
- SHAvite-3-512
- cryptanalysis
- (second) preimage
- collision
Fingerprint
Dive into the research topics of 'Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver