Cryptology ePrint Archive: Report 2008/501
Some Observations on SHAMATA
Ewan Fleischmann and Michael Gorski
Abstract: In this note we discuss some observation of the SHA-3 candidate SHAMATA. We observe that its internal block cipher is very weak, which could possibly lead to an attack on the hash function.
Category / Keywords: secret-key cryptography / hash function, SHA-3, SHAMATA
Date: received 27 Nov 2008
Contact author: Ewan (dot) Fleischman, Michael (dot) Gorski (at) uni (minus) weimar (dot) de
Available formats: PDF | BibTeX Citation
Version: 20081202:020125 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]