Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.
|Title of host publication||Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings|
|Number of pages||15|
|State||Published - 2009|
|Event||2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 - Gammarth, Tunisia|
Duration: 21 Jun 2009 → 25 Jun 2009
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Conference||2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009|
|Period||21/06/09 → 25/06/09|
Bibliographical noteFunding Information:
The work in this paper has been supported in part by the European Commission under contract ICT-2007-216646 (ECRYPT II) and by the IAP Programme P6/26 BCRYPT of the Belgian State (Belgian Science Policy).
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science (all)