Paper 2008/531

Collision Attack on the Waterfall Hash Function

Scott Fluhrer

Abstract

We give a method that appears to be able to find colliding messages for the Waterfall hash function with approximately $O(2^{70})$ work for all hash sizes. If correct, this would show that the Waterfall hash function does not meet the required collision resistance.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. none
Keywords
hash functionWaterfallSHA-3collisoncryptanalysis
Contact author(s)
sfluhrer @ cisco com
History
2008-12-19: received
Short URL
https://ia.cr/2008/531
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/531,
      author = {Scott Fluhrer},
      title = {Collision Attack on the Waterfall Hash Function},
      howpublished = {Cryptology ePrint Archive, Paper 2008/531},
      year = {2008},
      note = {\url{https://eprint.iacr.org/2008/531}},
      url = {https://eprint.iacr.org/2008/531}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.