Abstract
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen as candidates for the SHA-3 competition, organised by NIST. The proposal contains seven concrete hash functions, each with a different digest length. We present a practical collision attack on each of these seven EnRUPT variants. The time complexity of our attack varies from 2 36 to 2 40 round computations, depending on the EnRUPT variant, and the memory requirements are negligible. We demonstrate that our attack is practical by giving an actual collision example for EnRUPT-256. © 2010 International Association for Cryptologic Research.
Author supplied keywords
Cite
CITATION STYLE
Indesteege, S., & Preneel, B. (2011). Practical collisions for EnRUPT. Journal of Cryptology, 24(1), 1–23. https://doi.org/10.1007/s00145-010-9058-x
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.