Improved Analysis of ECHO-256

Abstract : ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function.
Type de document :
Communication dans un congrès
Ali Miri; Serge Vaudenay. SAC 2011 - 18th International Workshop Selected Areas in Cryptography, Aug 2011, Toronto, Canada. Springer, 7118, pp.19-36, 2011, LNCS - Lecture Notes in Computer Science. 〈10.1007/978-3-642-28496-0_2〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01110465
Contributeur : Brigitte Briot <>
Soumis le : mercredi 28 janvier 2015 - 11:38:37
Dernière modification le : vendredi 25 mai 2018 - 12:02:05

Lien texte intégral

Identifiants

Collections

Citation

Jérémy Jean, María Naya-Plasencia, Martin Schläffer. Improved Analysis of ECHO-256. Ali Miri; Serge Vaudenay. SAC 2011 - 18th International Workshop Selected Areas in Cryptography, Aug 2011, Toronto, Canada. Springer, 7118, pp.19-36, 2011, LNCS - Lecture Notes in Computer Science. 〈10.1007/978-3-642-28496-0_2〉. 〈hal-01110465〉

Partager

Métriques

Consultations de la notice

128