[Resource Topic] 2011/175: Analysis of reduced-SHAvite-3-256 v2

Welcome to the resource topic for 2011/175

Analysis of reduced-SHAvite-3-256 v2

Authors: Marine Minier, Maria Naya-Plasencia, Thomas Peyrin


In this article, we provide the first independent analysis of the (2nd-round tweaked) 256-bit version of the SHA-3 candidate SHAvite-3. By leveraging recently introduced cryptanalysis tools such as rebound attack or Super-Sbox cryptanalysis, we are able to derive chosen-related-salt distinguishing attacks on the compression function on up to 8 rounds (12 rounds in total) and free-start collisions on up to 7 rounds. In particular, our best results are obtained by carefully controlling the differences in the key schedule of the internal cipher. Most of our results have been implemented and verified experimentally.

ePrint: https://eprint.iacr.org/2011/175

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .