Cryptanalysis of Vortex View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2009

AUTHORS

Jean-Philippe Aumasson , Orr Dunkelman , Florian Mendel , Christian Rechberger , Søren S. Thomsen

ABSTRACT

Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms. More... »

PAGES

14-28

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-02384-2_2

DOI

http://dx.doi.org/10.1007/978-3-642-02384-2_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1004632446


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "\u00c9cole Normale Sup\u00e9rieure, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5607.4", 
          "name": [
            "\u00c9cole Normale Sup\u00e9rieure, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dunkelman", 
        "givenName": "Orr", 
        "id": "sg:person.016523255235.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016523255235.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mendel", 
        "givenName": "Florian", 
        "id": "sg:person.013342563571.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013342563571.85"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rechberger", 
        "givenName": "Christian", 
        "id": "sg:person.013632630546.55", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013632630546.55"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "DTU Mathematics, Technical University of Denmark, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.5170.3", 
          "name": [
            "DTU Mathematics, Technical University of Denmark, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Thomsen", 
        "givenName": "S\u00f8ren S.", 
        "id": "sg:person.010617664132.88", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010617664132.88"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "Vortex is a hash function that was first presented at ISC\u20192008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.", 
    "editor": [
      {
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-02384-2_2", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-02383-5", 
        "978-3-642-02384-2"
      ], 
      "name": "Progress in Cryptology \u2013 AFRICACRYPT 2009", 
      "type": "Book"
    }, 
    "keywords": [
      "NIST SHA-3 competition", 
      "function", 
      "attacks", 
      "modification", 
      "version", 
      "design", 
      "SHA-3 competition", 
      "flaws", 
      "low-level algorithms", 
      "high-level design", 
      "hash function", 
      "competition", 
      "second preimage", 
      "cryptanalysis", 
      "algorithm", 
      "preimage", 
      "distinguisher", 
      "paper", 
      "collisions", 
      "vortices"
    ], 
    "name": "Cryptanalysis of Vortex", 
    "pagination": "14-28", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1004632446"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-02384-2_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-02384-2_2", 
      "https://app.dimensions.ai/details/publication/pub.1004632446"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:33", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_339.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-02384-2_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02384-2_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02384-2_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02384-2_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02384-2_2'


 

This table displays all metadata directly associated to this object as RDF triples.

117 TRIPLES      23 PREDICATES      46 URIs      39 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-02384-2_2 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Nab5380fc33ab4eb6b2eb93cb08c78f2a
4 schema:datePublished 2009
5 schema:datePublishedReg 2009-01-01
6 schema:description Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.
7 schema:editor N1654a2fcda8746e09098b51ef03dc6ab
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N6b7d279cca9b4e15afba5b505fa1e1c8
12 schema:keywords NIST SHA-3 competition
13 SHA-3 competition
14 algorithm
15 attacks
16 collisions
17 competition
18 cryptanalysis
19 design
20 distinguisher
21 flaws
22 function
23 hash function
24 high-level design
25 low-level algorithms
26 modification
27 paper
28 preimage
29 second preimage
30 version
31 vortices
32 schema:name Cryptanalysis of Vortex
33 schema:pagination 14-28
34 schema:productId N06997c41252945d18d04f38ab2118555
35 Nccb34ffe73bf4785a2bebd9122a9622e
36 schema:publisher N83a2026310e94e82aa87a98202b8b498
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004632446
38 https://doi.org/10.1007/978-3-642-02384-2_2
39 schema:sdDatePublished 2022-06-01T22:33
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher N83e147a1fea040cdbbaa5432db7a59fd
42 schema:url https://doi.org/10.1007/978-3-642-02384-2_2
43 sgo:license sg:explorer/license/
44 sgo:sdDataset chapters
45 rdf:type schema:Chapter
46 N06997c41252945d18d04f38ab2118555 schema:name doi
47 schema:value 10.1007/978-3-642-02384-2_2
48 rdf:type schema:PropertyValue
49 N1654a2fcda8746e09098b51ef03dc6ab rdf:first N365e65927f014c75b6a1a48fd53af681
50 rdf:rest rdf:nil
51 N2e394fb7dbdf45d285acd1a7c357a5a7 rdf:first sg:person.016523255235.34
52 rdf:rest Nf4aa559d224c49d6a66d1c7e2adda9da
53 N329568727e624ae6a9300f6d2c0b334a rdf:first sg:person.010617664132.88
54 rdf:rest rdf:nil
55 N365e65927f014c75b6a1a48fd53af681 schema:familyName Preneel
56 schema:givenName Bart
57 rdf:type schema:Person
58 N41554be0e2aa4662a0154065ff3a70a2 rdf:first sg:person.013632630546.55
59 rdf:rest N329568727e624ae6a9300f6d2c0b334a
60 N6b7d279cca9b4e15afba5b505fa1e1c8 schema:isbn 978-3-642-02383-5
61 978-3-642-02384-2
62 schema:name Progress in Cryptology – AFRICACRYPT 2009
63 rdf:type schema:Book
64 N83a2026310e94e82aa87a98202b8b498 schema:name Springer Nature
65 rdf:type schema:Organisation
66 N83e147a1fea040cdbbaa5432db7a59fd schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 Nab5380fc33ab4eb6b2eb93cb08c78f2a rdf:first sg:person.012606440341.66
69 rdf:rest N2e394fb7dbdf45d285acd1a7c357a5a7
70 Nccb34ffe73bf4785a2bebd9122a9622e schema:name dimensions_id
71 schema:value pub.1004632446
72 rdf:type schema:PropertyValue
73 Nf4aa559d224c49d6a66d1c7e2adda9da rdf:first sg:person.013342563571.85
74 rdf:rest N41554be0e2aa4662a0154065ff3a70a2
75 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
76 schema:name Information and Computing Sciences
77 rdf:type schema:DefinedTerm
78 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
79 schema:name Artificial Intelligence and Image Processing
80 rdf:type schema:DefinedTerm
81 sg:person.010617664132.88 schema:affiliation grid-institutes:grid.5170.3
82 schema:familyName Thomsen
83 schema:givenName Søren S.
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010617664132.88
85 rdf:type schema:Person
86 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
87 schema:familyName Aumasson
88 schema:givenName Jean-Philippe
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
90 rdf:type schema:Person
91 sg:person.013342563571.85 schema:affiliation grid-institutes:grid.410413.3
92 schema:familyName Mendel
93 schema:givenName Florian
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013342563571.85
95 rdf:type schema:Person
96 sg:person.013632630546.55 schema:affiliation grid-institutes:grid.410413.3
97 schema:familyName Rechberger
98 schema:givenName Christian
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013632630546.55
100 rdf:type schema:Person
101 sg:person.016523255235.34 schema:affiliation grid-institutes:grid.5607.4
102 schema:familyName Dunkelman
103 schema:givenName Orr
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016523255235.34
105 rdf:type schema:Person
106 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
107 schema:name FHNW, Windisch, Switzerland
108 rdf:type schema:Organization
109 grid-institutes:grid.410413.3 schema:alternateName IAIK, Graz University of Technology, Austria
110 schema:name IAIK, Graz University of Technology, Austria
111 rdf:type schema:Organization
112 grid-institutes:grid.5170.3 schema:alternateName DTU Mathematics, Technical University of Denmark, Denmark
113 schema:name DTU Mathematics, Technical University of Denmark, Denmark
114 rdf:type schema:Organization
115 grid-institutes:grid.5607.4 schema:alternateName École Normale Supérieure, Paris, France
116 schema:name École Normale Supérieure, Paris, France
117 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...