Cryptanalysis of Vortex

Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren Steffen Thomsen

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.
    Original languageEnglish
    Title of host publicationProgress in Cryptology - AFRICACRYPT 2009 : Proceedings
    EditorsBart Preneel
    PublisherSpringer
    Publication date2009
    Pages14-28
    DOIs
    Publication statusPublished - 2009
    Event2nd International Conference on Cryptology in Africa - Gammarth, Tunisia
    Duration: 21 Jun 200925 Jun 2009
    Conference number: 2
    http://www.informatik.uni-trier.de/~ley/db/conf/africacrypt/index.html

    Conference

    Conference2nd International Conference on Cryptology in Africa
    Number2
    Country/TerritoryTunisia
    CityGammarth
    Period21/06/200925/06/2009
    Internet address
    SeriesLecture Notes in Computer Science
    Number5580
    ISSN0302-9743

    Fingerprint

    Dive into the research topics of 'Cryptanalysis of Vortex'. Together they form a unique fingerprint.

    Cite this