Cryptanalysis of vortex

Jean Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.

Original languageEnglish
Title of host publicationProgress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings
Pages14-28
Number of pages15
DOIs
StatePublished - 2009
Externally publishedYes
Event2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 - Gammarth, Tunisia
Duration: 21 Jun 200925 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5580 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009
Country/TerritoryTunisia
CityGammarth
Period21/06/0925/06/09

Bibliographical note

Funding Information:
The work in this paper has been supported in part by the European Commission under contract ICT-2007-216646 (ECRYPT II) and by the IAP Programme P6/26 BCRYPT of the Belgian State (Belgian Science Policy).

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Cryptanalysis of vortex'. Together they form a unique fingerprint.

Cite this