Improved Analysis of ECHO-256 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Jérémy Jean , María Naya-Plasencia , Martin Schläffer

ABSTRACT

ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function. More... »

PAGES

19-36

Book

TITLE

Selected Areas in Cryptography

ISBN

978-3-642-28495-3
978-3-642-28496-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2

DOI

http://dx.doi.org/10.1007/978-3-642-28496-0_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000169108


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Ecole Normale Sup\u00e9rieure, France", 
          "id": "http://www.grid.ac/institutes/grid.5607.4", 
          "name": [
            "Ecole Normale Sup\u00e9rieure, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jean", 
        "givenName": "J\u00e9r\u00e9my", 
        "id": "sg:person.014232271321.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014232271321.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schl\u00e4ffer", 
        "givenName": "Martin", 
        "id": "sg:person.015166313415.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015166313415.52"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function.", 
    "editor": [
      {
        "familyName": "Miri", 
        "givenName": "Ali", 
        "type": "Person"
      }, 
      {
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-28496-0_2", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-28495-3", 
        "978-3-642-28496-0"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "function results", 
      "rebound techniques", 
      "function", 
      "rounds", 
      "analysis", 
      "large number", 
      "candidates", 
      "attacks", 
      "number", 
      "results", 
      "technique", 
      "interest", 
      "SHA-3 competition", 
      "one", 
      "AES", 
      "compression function", 
      "competition", 
      "second round candidates", 
      "collision attack", 
      "permutations", 
      "paper", 
      "collisions", 
      "distinguisher", 
      "internal permutation", 
      "hash function"
    ], 
    "name": "Improved Analysis of ECHO-256", 
    "pagination": "19-36", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000169108"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-28496-0_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-28496-0_2", 
      "https://app.dimensions.ai/details/publication/pub.1000169108"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:11", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_187.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-28496-0_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'


 

This table displays all metadata directly associated to this object as RDF triples.

109 TRIPLES      22 PREDICATES      50 URIs      43 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-28496-0_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N57993904b7b24ce094557cc854a6ba49
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function.
7 schema:editor Nae5fa313bdd94985a3168d5b02ed032d
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N3abf73d1d1e7411ca244c5e7ef201e5c
11 schema:keywords AES
12 SHA-3 competition
13 analysis
14 attacks
15 candidates
16 collision attack
17 collisions
18 competition
19 compression function
20 distinguisher
21 function
22 function results
23 hash function
24 interest
25 internal permutation
26 large number
27 number
28 one
29 paper
30 permutations
31 rebound techniques
32 results
33 rounds
34 second round candidates
35 technique
36 schema:name Improved Analysis of ECHO-256
37 schema:pagination 19-36
38 schema:productId N1336f76269ca4eaf8bc6e627669a7aef
39 N34171632870a475aaee1f5973aba1483
40 schema:publisher Nbb92e54b569247cfad835fa3b5a83840
41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000169108
42 https://doi.org/10.1007/978-3-642-28496-0_2
43 schema:sdDatePublished 2022-09-02T16:11
44 schema:sdLicense https://scigraph.springernature.com/explorer/license/
45 schema:sdPublisher Ne743e6dcdfa84532a49bd7e97770b5b5
46 schema:url https://doi.org/10.1007/978-3-642-28496-0_2
47 sgo:license sg:explorer/license/
48 sgo:sdDataset chapters
49 rdf:type schema:Chapter
50 N1336f76269ca4eaf8bc6e627669a7aef schema:name dimensions_id
51 schema:value pub.1000169108
52 rdf:type schema:PropertyValue
53 N1f2f319b13204f5bb8755ec8ef106dcb schema:familyName Vaudenay
54 schema:givenName Serge
55 rdf:type schema:Person
56 N2992243a271d4c2689062176ca41e266 rdf:first sg:person.013206304341.94
57 rdf:rest N36734e62d0d3423596aacddae4adb5df
58 N34171632870a475aaee1f5973aba1483 schema:name doi
59 schema:value 10.1007/978-3-642-28496-0_2
60 rdf:type schema:PropertyValue
61 N36734e62d0d3423596aacddae4adb5df rdf:first sg:person.015166313415.52
62 rdf:rest rdf:nil
63 N3abf73d1d1e7411ca244c5e7ef201e5c schema:isbn 978-3-642-28495-3
64 978-3-642-28496-0
65 schema:name Selected Areas in Cryptography
66 rdf:type schema:Book
67 N3d6cb2dd421d4591b2388ae40570a042 rdf:first N1f2f319b13204f5bb8755ec8ef106dcb
68 rdf:rest rdf:nil
69 N57993904b7b24ce094557cc854a6ba49 rdf:first sg:person.014232271321.52
70 rdf:rest N2992243a271d4c2689062176ca41e266
71 Nae5fa313bdd94985a3168d5b02ed032d rdf:first Nf6bbcde2a97841bfbb8b3142c26e34a2
72 rdf:rest N3d6cb2dd421d4591b2388ae40570a042
73 Nbb92e54b569247cfad835fa3b5a83840 schema:name Springer Nature
74 rdf:type schema:Organisation
75 Ne743e6dcdfa84532a49bd7e97770b5b5 schema:name Springer Nature - SN SciGraph project
76 rdf:type schema:Organization
77 Nf6bbcde2a97841bfbb8b3142c26e34a2 schema:familyName Miri
78 schema:givenName Ali
79 rdf:type schema:Person
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.410380.e
87 schema:familyName Naya-Plasencia
88 schema:givenName María
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
90 rdf:type schema:Person
91 sg:person.014232271321.52 schema:affiliation grid-institutes:grid.5607.4
92 schema:familyName Jean
93 schema:givenName Jérémy
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014232271321.52
95 rdf:type schema:Person
96 sg:person.015166313415.52 schema:affiliation grid-institutes:grid.410413.3
97 schema:familyName Schläffer
98 schema:givenName Martin
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015166313415.52
100 rdf:type schema:Person
101 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
102 schema:name FHNW, Windisch, Switzerland
103 rdf:type schema:Organization
104 grid-institutes:grid.410413.3 schema:alternateName IAIK, Graz University of Technology, Austria
105 schema:name IAIK, Graz University of Technology, Austria
106 rdf:type schema:Organization
107 grid-institutes:grid.5607.4 schema:alternateName Ecole Normale Supérieure, France
108 schema:name Ecole Normale Supérieure, France
109 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...