Abstract
Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.
Original language | English |
---|---|
Title of host publication | Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings |
Pages | 14-28 |
Number of pages | 15 |
DOIs | |
State | Published - 2009 |
Externally published | Yes |
Event | 2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 - Gammarth, Tunisia Duration: 21 Jun 2009 → 25 Jun 2009 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 5580 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 |
---|---|
Country/Territory | Tunisia |
City | Gammarth |
Period | 21/06/09 → 25/06/09 |
Bibliographical note
Funding Information:The work in this paper has been supported in part by the European Commission under contract ICT-2007-216646 (ECRYPT II) and by the IAP Programme P6/26 BCRYPT of the Belgian State (Belgian Science Policy).
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science