[Resource Topic] 2016/396: Cryptanalysis of Haraka

Welcome to the resource topic for 2016/396

Cryptanalysis of Haraka

Authors: Jérémy Jean


In this note, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 2^{16} function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about 2^{192} function evaluations. These attacks are possible thanks to symmetries in the internal state that are preserved over several rounds.

ePrint: https://eprint.iacr.org/2016/396

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .