This attack only uses very simple techniques, most of which are borrowed from previous analysis of CubeHash: we just combine symmetry based attacks [1,8] with Grover's algorithm. However, it is arguably the first attack on a second-round SHA-3 candidate that is more efficient than the attacks considered by the designer.
Category / Keywords: secret-key cryptography / Hash functions, SHA-3, CubeHash Date: received 3 Oct 2010, last revised 30 Nov 2010 Contact author: gaetan leurent at ens fr Available formats: PDF | BibTeX Citation Version: 20101130:173502 (All versions of this report) Discussion forum: Show discussion | Start new discussion