Cryptology ePrint Archive: Report 2008/501

Some Observations on SHAMATA

Ewan Fleischmann and Michael Gorski

Abstract: In this note we discuss some observation of the SHA-3 candidate SHAMATA. We observe that its internal block cipher is very weak, which could possibly lead to an attack on the hash function.

Category / Keywords: secret-key cryptography / hash function, SHA-3, SHAMATA

Date: received 27 Nov 2008

Contact author: Ewan (dot) Fleischman, Michael (dot) Gorski (at) uni (minus) weimar (dot) de

Available format(s): PDF | BibTeX Citation

Version: 20081202:020125 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]