Cryptology ePrint Archive: Report 2011/307

Ways to restrict the differential path

ZiJie Xu and Ke Xu

Abstract: People had developed some attack methods to attack hash function. These methods need to choose some "differential pattern"[Dau05]. We present a way to restrict the collisions that hold the "differential pattern". At the same time, to build a hash function that meet the different needs, we propose a construction.

Category / Keywords: differential path, differential cryptanalysis, hash function, data-depend function

Date: received 4 Jun 2011, last revised 9 Sep 2011

Contact author: xuzijiewz at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20110909:151819 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]