Abstract
Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.
Original language | English |
---|---|
Title of host publication | Progress in Cryptology - AFRICACRYPT 2009 : Proceedings |
Editors | Bart Preneel |
Publisher | Springer |
Publication date | 2009 |
Pages | 14-28 |
DOIs | |
Publication status | Published - 2009 |
Event | 2nd International Conference on Cryptology in Africa - Gammarth, Tunisia Duration: 21 Jun 2009 → 25 Jun 2009 Conference number: 2 http://www.informatik.uni-trier.de/~ley/db/conf/africacrypt/index.html |
Conference
Conference | 2nd International Conference on Cryptology in Africa |
---|---|
Number | 2 |
Country/Territory | Tunisia |
City | Gammarth |
Period | 21/06/2009 → 25/06/2009 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Number | 5580 |
ISSN | 0302-9743 |