Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256

Published

Author(s)

Cagdas Calik , Meltem Sonmez Turan

Abstract

Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of Hamsi-256. Based on these properties, we first demonstrate a distinguishing attack that requires a few evaluations of the compression function. Then, we present a message recovery attack with a complexity of 2^10.48 compression function evaluations. Also, we present a pseudo-preimage attack for the compression function with complexity 2^254.25.
Proceedings Title
Progress in Cryptology - LATINCRYPT 2010 (Lecture Notes in Computer Science)
Volume
6212
Conference Dates
August 8-11, 2010
Conference Location
Puebla, MX
Conference Title
First International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2010)

Keywords

Hash functions, SHA-3 competition, Pseudo-preimage attacks

Citation

Calik, C. and Sonmez Turan, M. (2010), Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256, Progress in Cryptology - LATINCRYPT 2010 (Lecture Notes in Computer Science), Puebla, MX, [online], https://doi.org/10.1007/978-3-642-14712-8_13, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=904738 (Accessed May 21, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created August 7, 2010, Updated October 12, 2021