Inside the Hypercube View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2009

AUTHORS

Jean-Philippe Aumasson , Eric Brier , Willi Meier , María Naya-Plasencia , Thomas Peyrin

ABSTRACT

Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a block byte size b, and a digest bit length h (the compression function makes r rounds, while the finalization function makes 10r rounds). The 1024-bit internal state of CubeHash is represented as a five-dimensional hypercube. The submissions to NIST recommends r = 8, b = 1, and h ∈ {224,256,384,512}.This paper presents the first external analysis of CubeHash, with improved standard generic attacks for collisions and preimagesa multicollision attack that exploits fixed pointsa study of the round function symmetriesa preimage attack that exploits these symmetriesa practical collision attack on a weakened version of CubeHasha study of fixed points and an example of nontrivial fixed pointhigh-probability truncated differentials over 10 rounds Since the first publication of these results, several collision attacks for reduced versions of CubeHash were published by Dai, Peyrin, et al. Our results are more general, since they apply to any choice of the parameters, and show intrinsic properties of the CubeHash design, rather than attacks on specific versions. More... »

PAGES

202-213

Book

TITLE

Information Security and Privacy

ISBN

978-3-642-02619-5
978-3-642-02620-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-02620-1_14

DOI

http://dx.doi.org/10.1007/978-3-642-02620-1_14

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1005097014


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ingenico, France", 
          "id": "http://www.grid.ac/institutes/grid.435187.c", 
          "name": [
            "Ingenico, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Brier", 
        "givenName": "Eric", 
        "id": "sg:person.012736733764.24", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012736733764.24"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "INRIA project-team SECRET, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "INRIA project-team SECRET, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ingenico, France", 
          "id": "http://www.grid.ac/institutes/grid.435187.c", 
          "name": [
            "Ingenico, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Peyrin", 
        "givenName": "Thomas", 
        "id": "sg:person.011167161615.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "Bernstein\u2019s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a block byte size b, and a digest bit length h (the compression function makes r rounds, while the finalization function makes 10r rounds). The 1024-bit internal state of CubeHash is represented as a five-dimensional hypercube. The submissions to NIST recommends r\u2009=\u20098, b\u2009=\u20091, and h\u2009\u2208\u2009{224,256,384,512}.This paper presents the first external analysis of CubeHash, with \nimproved standard generic attacks for collisions and preimagesa multicollision attack that exploits fixed pointsa study of the round function symmetriesa preimage attack that exploits these symmetriesa practical collision attack on a weakened version of CubeHasha study of fixed points and an example of nontrivial fixed pointhigh-probability truncated differentials over 10 rounds\nSince the first publication of these results, several collision attacks for reduced versions of CubeHash were published by Dai, Peyrin, et al. Our results are more general, since they apply to any choice of the parameters, and show intrinsic properties of the CubeHash design, rather than attacks on specific versions.", 
    "editor": [
      {
        "familyName": "Boyd", 
        "givenName": "Colin", 
        "type": "Person"
      }, 
      {
        "familyName": "Gonz\u00e1lez Nieto", 
        "givenName": "Juan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-02620-1_14", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-02619-5", 
        "978-3-642-02620-1"
      ], 
      "name": "Information Security and Privacy", 
      "type": "Book"
    }, 
    "keywords": [
      "study", 
      "function", 
      "first publication", 
      "attacks", 
      "results", 
      "family", 
      "rounds", 
      "intrinsic properties", 
      "publications", 
      "DAI", 
      "number", 
      "choice", 
      "differential", 
      "analysis", 
      "version", 
      "submission", 
      "et al", 
      "point", 
      "external analysis", 
      "reduced versions", 
      "state", 
      "parameters", 
      "NIST Hash Competition", 
      "preimage attack", 
      "design", 
      "internal states", 
      "properties", 
      "specific version", 
      "al", 
      "competition", 
      "collision attack", 
      "example", 
      "size B", 
      "weakened version", 
      "Peyrin", 
      "multicollision attack", 
      "hash function family", 
      "paper", 
      "NIST", 
      "collisions", 
      "function family", 
      "generic attacks", 
      "hypercube", 
      "length h", 
      "round r", 
      "practical collision attacks", 
      "CubeHash", 
      "Bernstein\u2019s CubeHash", 
      "Hash Competition", 
      "CubeHash function", 
      "block byte size b", 
      "byte size b", 
      "digest bit length h", 
      "bit length h", 
      "five-dimensional hypercube", 
      "first external analysis", 
      "standard generic attacks", 
      "preimagesa multicollision attack", 
      "pointsa study", 
      "round function symmetriesa preimage attack", 
      "function symmetriesa preimage attack", 
      "symmetriesa preimage attack", 
      "symmetriesa practical collision attack", 
      "CubeHasha study", 
      "CubeHash design"
    ], 
    "name": "Inside the Hypercube", 
    "pagination": "202-213", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1005097014"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-02620-1_14"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-02620-1_14", 
      "https://app.dimensions.ai/details/publication/pub.1005097014"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:23", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_397.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-02620-1_14"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02620-1_14'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02620-1_14'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02620-1_14'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02620-1_14'


 

This table displays all metadata directly associated to this object as RDF triples.

164 TRIPLES      23 PREDICATES      91 URIs      84 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-02620-1_14 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nd030e651c4c14bd5b620aaaa23161989
4 schema:datePublished 2009
5 schema:datePublishedReg 2009-01-01
6 schema:description Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a block byte size b, and a digest bit length h (the compression function makes r rounds, while the finalization function makes 10r rounds). The 1024-bit internal state of CubeHash is represented as a five-dimensional hypercube. The submissions to NIST recommends r = 8, b = 1, and h ∈ {224,256,384,512}.This paper presents the first external analysis of CubeHash, with improved standard generic attacks for collisions and preimagesa multicollision attack that exploits fixed pointsa study of the round function symmetriesa preimage attack that exploits these symmetriesa practical collision attack on a weakened version of CubeHasha study of fixed points and an example of nontrivial fixed pointhigh-probability truncated differentials over 10 rounds Since the first publication of these results, several collision attacks for reduced versions of CubeHash were published by Dai, Peyrin, et al. Our results are more general, since they apply to any choice of the parameters, and show intrinsic properties of the CubeHash design, rather than attacks on specific versions.
7 schema:editor Nc6ed9f1466d34e1f9ee291849b78c4a1
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N0eee911c52eb4a37b2e64c22cca4f761
12 schema:keywords Bernstein’s CubeHash
13 CubeHash
14 CubeHash design
15 CubeHash function
16 CubeHasha study
17 DAI
18 Hash Competition
19 NIST
20 NIST Hash Competition
21 Peyrin
22 al
23 analysis
24 attacks
25 bit length h
26 block byte size b
27 byte size b
28 choice
29 collision attack
30 collisions
31 competition
32 design
33 differential
34 digest bit length h
35 et al
36 example
37 external analysis
38 family
39 first external analysis
40 first publication
41 five-dimensional hypercube
42 function
43 function family
44 function symmetriesa preimage attack
45 generic attacks
46 hash function family
47 hypercube
48 internal states
49 intrinsic properties
50 length h
51 multicollision attack
52 number
53 paper
54 parameters
55 point
56 pointsa study
57 practical collision attacks
58 preimage attack
59 preimagesa multicollision attack
60 properties
61 publications
62 reduced versions
63 results
64 round function symmetriesa preimage attack
65 round r
66 rounds
67 size B
68 specific version
69 standard generic attacks
70 state
71 study
72 submission
73 symmetriesa practical collision attack
74 symmetriesa preimage attack
75 version
76 weakened version
77 schema:name Inside the Hypercube
78 schema:pagination 202-213
79 schema:productId N64592cd578ef4cf6ad3fdd5cf113726c
80 Ne42664350d2647ffb41f6c1d30a586e9
81 schema:publisher N491c17f2d5c14220bafd76508bb082a9
82 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005097014
83 https://doi.org/10.1007/978-3-642-02620-1_14
84 schema:sdDatePublished 2022-01-01T19:23
85 schema:sdLicense https://scigraph.springernature.com/explorer/license/
86 schema:sdPublisher N88219a60d4ac4f9a8bc920a4c13fde0e
87 schema:url https://doi.org/10.1007/978-3-642-02620-1_14
88 sgo:license sg:explorer/license/
89 sgo:sdDataset chapters
90 rdf:type schema:Chapter
91 N0eee911c52eb4a37b2e64c22cca4f761 schema:isbn 978-3-642-02619-5
92 978-3-642-02620-1
93 schema:name Information Security and Privacy
94 rdf:type schema:Book
95 N3c8c74a1a0594c50bf38fff53ce81d20 rdf:first sg:person.012736733764.24
96 rdf:rest N7a275a72d868422c95b3a47ce3f94566
97 N491c17f2d5c14220bafd76508bb082a9 schema:name Springer Nature
98 rdf:type schema:Organisation
99 N4b3a9b3f7017471aa62a6cbd68067cf8 schema:familyName Boyd
100 schema:givenName Colin
101 rdf:type schema:Person
102 N64592cd578ef4cf6ad3fdd5cf113726c schema:name doi
103 schema:value 10.1007/978-3-642-02620-1_14
104 rdf:type schema:PropertyValue
105 N7a275a72d868422c95b3a47ce3f94566 rdf:first sg:person.07653531142.18
106 rdf:rest Nf9cdb6066e414e9f8434d9ba1d141f6c
107 N88219a60d4ac4f9a8bc920a4c13fde0e schema:name Springer Nature - SN SciGraph project
108 rdf:type schema:Organization
109 Nbe6efe5455ac44baa5c665bb3087d26b rdf:first Nee045fa2e39c4684b1827baa6fca37a7
110 rdf:rest rdf:nil
111 Nc6ed9f1466d34e1f9ee291849b78c4a1 rdf:first N4b3a9b3f7017471aa62a6cbd68067cf8
112 rdf:rest Nbe6efe5455ac44baa5c665bb3087d26b
113 Nd030e651c4c14bd5b620aaaa23161989 rdf:first sg:person.012606440341.66
114 rdf:rest N3c8c74a1a0594c50bf38fff53ce81d20
115 Ne42664350d2647ffb41f6c1d30a586e9 schema:name dimensions_id
116 schema:value pub.1005097014
117 rdf:type schema:PropertyValue
118 Ne6e9f441768948289ffaaf228790cd3a rdf:first sg:person.011167161615.31
119 rdf:rest rdf:nil
120 Nee045fa2e39c4684b1827baa6fca37a7 schema:familyName González Nieto
121 schema:givenName Juan
122 rdf:type schema:Person
123 Nf9cdb6066e414e9f8434d9ba1d141f6c rdf:first sg:person.013206304341.94
124 rdf:rest Ne6e9f441768948289ffaaf228790cd3a
125 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
126 schema:name Information and Computing Sciences
127 rdf:type schema:DefinedTerm
128 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
129 schema:name Data Format
130 rdf:type schema:DefinedTerm
131 sg:person.011167161615.31 schema:affiliation grid-institutes:grid.435187.c
132 schema:familyName Peyrin
133 schema:givenName Thomas
134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31
135 rdf:type schema:Person
136 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
137 schema:familyName Aumasson
138 schema:givenName Jean-Philippe
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
140 rdf:type schema:Person
141 sg:person.012736733764.24 schema:affiliation grid-institutes:grid.435187.c
142 schema:familyName Brier
143 schema:givenName Eric
144 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012736733764.24
145 rdf:type schema:Person
146 sg:person.013206304341.94 schema:affiliation grid-institutes:None
147 schema:familyName Naya-Plasencia
148 schema:givenName María
149 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
150 rdf:type schema:Person
151 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
152 schema:familyName Meier
153 schema:givenName Willi
154 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
155 rdf:type schema:Person
156 grid-institutes:None schema:alternateName INRIA project-team SECRET, France
157 schema:name INRIA project-team SECRET, France
158 rdf:type schema:Organization
159 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
160 schema:name FHNW, Windisch, Switzerland
161 rdf:type schema:Organization
162 grid-institutes:grid.435187.c schema:alternateName Ingenico, France
163 schema:name Ingenico, France
164 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...