Paper 2008/531

Collision Attack on the Waterfall Hash Function

Scott Fluhrer

Abstract

We give a method that appears to be able to find colliding messages for the Waterfall hash function with approximately O(270) work for all hash sizes. If correct, this would show that the Waterfall hash function does not meet the required collision resistance.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. none
Keywords
hash functionWaterfallSHA-3collisoncryptanalysis
Contact author(s)
sfluhrer @ cisco com
History
2008-12-19: received
Short URL
https://ia.cr/2008/531
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/531,
      author = {Scott Fluhrer},
      title = {Collision Attack on the Waterfall Hash Function},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/531},
      year = {2008},
      url = {https://eprint.iacr.org/2008/531}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.