Improved security analysis of Fugue-256 (poster)

Praveen Gauravaram, Lars Ramkilde Knudsen, Nasoor Bagheri, Lei Wei

Research output: Contribution to journalConference articleResearchpeer-review

Abstract

We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST's SHA3 competition. First we improve Aumasson and Phans' integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers' meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256. © 2011 Springer-Verlag.
Original languageEnglish
Book seriesLecture Notes in Computer Science
Volume6812
Pages (from-to)428-432
ISSN0302-9743
DOIs
Publication statusPublished - 2011
Event16th Australasian Conference on Information Security and Privacy - Melbourne, Australia
Duration: 11 Jul 201113 Jul 2011
Conference number: 16

Conference

Conference16th Australasian Conference on Information Security and Privacy
Number16
Country/TerritoryAustralia
CityMelbourne
Period11/07/201113/07/2011

Fingerprint

Dive into the research topics of 'Improved security analysis of Fugue-256 (poster)'. Together they form a unique fingerprint.

Cite this