Welcome to the resource topic for 2016/396
Title:
Cryptanalysis of Haraka
Authors: Jérémy Jean
Abstract:In this note, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 2^{16} function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about 2^{192} function evaluations. These attacks are possible thanks to symmetries in the internal state that are preserved over several rounds.
ePrint: https://eprint.iacr.org/2016/396
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .