Grøstl Addendum

نویسندگان

  • Praveen Gauravaram
  • Lars R. Knudsen
  • Krystian Matusiewicz
  • Florian Mendel
  • Christian Rechberger
  • Martin Schläffer
  • Søren S. Thomsen
چکیده

This document is an addendum to the submission document of Grøstl, which was selected for the second round of NIST’s SHA-3 competition [18]. We stress that we do not change the specification of Grøstl. In other words, Grøstl is defined exactly as specified in the original submission document [8]. In this document we mention a few alternative descriptions of our SHA-3 candidate Grøstl and describe recent analysis results on Grøstl. We briefly recall that the Grøstl compression function is based on two large and distinct `bit permutations P and Q (where ` ≥ 2n, n being the output size of the hash function), and is defined as f(h,m) = P (h ⊕ m) ⊕ Q(m) ⊕ h, where h is the chaining value and m is the message block. The permutations P and Q are built using the wide trail design strategy. A Merkle-Damg̊ard iteration [6, 17] of the compression function is applied, and it is followed by an output transformation defined as ω(x) = truncn(P (x) ⊕ x), where truncn indicates truncation to n bits. When n ≤ 256, we have ` = 512, and when n > 256 we have ` = 1024.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A High-Speed Unified Hardware Architecture for AES and the SHA-3 Candidate Grøstl

The NIST competition for developing the new cryptographic hash standard SHA-3 is currently in the third round. One of the five remaining candidates, Grøstl, is inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical applications. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, interna...

متن کامل

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function

The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we propose some improved (pseudo) preimage attacks on the Grøstl hash function by using some techniques, such as subspace preimage attack and the guess-and-determine technique. We present the improved pseudo preimage attacks on 5-round Grøstl-256 hash function and 8-round...

متن کامل

Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl

Grøstl is an AES-based hash function and one of the 5 finalists of the SHA-3 competition. In this work we present high-speed implementations of Grøstl for small 8-bit CPUs and large 64-bit CPUs with the recently introduced AES instructions set. Since Grøstl does not use the same MDS mixing layer as the AES, a direct application of the AES instructions seems difficult. In contrast to previous fi...

متن کامل

Rebound Attacks on the Reduced Grøstl Hash Function

Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl-512 has not been analyzed yet. In this paper, we show the first cryptanalytic attacks on reduced-rou...

متن کامل

Grøstl - a SHA-3 candidate

Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression function built from two fixed, large, distinct permutations. The design of Grøstl is transparent and based on principles very different from those used in the SHA-family. The two permutations are constructed using the wide trail design strategy, which makes it possible to give strong statements about th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009