Improved Analysis of ECHO-256 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Jérémy Jean , María Naya-Plasencia , Martin Schläffer

ABSTRACT

ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function. More... »

PAGES

19-36

Book

TITLE

Selected Areas in Cryptography

ISBN

978-3-642-28495-3
978-3-642-28496-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2

DOI

http://dx.doi.org/10.1007/978-3-642-28496-0_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000169108


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Ecole Normale Sup\u00e9rieure, France", 
          "id": "http://www.grid.ac/institutes/grid.5607.4", 
          "name": [
            "Ecole Normale Sup\u00e9rieure, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jean", 
        "givenName": "J\u00e9r\u00e9my", 
        "id": "sg:person.014232271321.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014232271321.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schl\u00e4ffer", 
        "givenName": "Martin", 
        "id": "sg:person.015166313415.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015166313415.52"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function.", 
    "editor": [
      {
        "familyName": "Miri", 
        "givenName": "Ali", 
        "type": "Person"
      }, 
      {
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-28496-0_2", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-28495-3", 
        "978-3-642-28496-0"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "function results", 
      "rebound techniques", 
      "function", 
      "rounds", 
      "analysis", 
      "large number", 
      "candidates", 
      "attacks", 
      "number", 
      "results", 
      "technique", 
      "interest", 
      "SHA-3 competition", 
      "one", 
      "AES", 
      "compression function", 
      "competition", 
      "second round candidates", 
      "collision attack", 
      "permutations", 
      "paper", 
      "collisions", 
      "distinguisher", 
      "internal permutation", 
      "hash function"
    ], 
    "name": "Improved Analysis of ECHO-256", 
    "pagination": "19-36", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000169108"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-28496-0_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-28496-0_2", 
      "https://app.dimensions.ai/details/publication/pub.1000169108"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:50", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_290.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-28496-0_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_2'


 

This table displays all metadata directly associated to this object as RDF triples.

109 TRIPLES      22 PREDICATES      50 URIs      43 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-28496-0_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N107da495acbf4a59b8da57ca3accfce6
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description ECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distinguisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function.
7 schema:editor N964aa039c8c94e119fe829d6d02ce0ce
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N1f24fc47d33d4380bbaf62099689641e
11 schema:keywords AES
12 SHA-3 competition
13 analysis
14 attacks
15 candidates
16 collision attack
17 collisions
18 competition
19 compression function
20 distinguisher
21 function
22 function results
23 hash function
24 interest
25 internal permutation
26 large number
27 number
28 one
29 paper
30 permutations
31 rebound techniques
32 results
33 rounds
34 second round candidates
35 technique
36 schema:name Improved Analysis of ECHO-256
37 schema:pagination 19-36
38 schema:productId Ndba0c7c556f04a8aac1f5991748b041c
39 Ne83da8da0be14fd9bef3173eb63f2ac0
40 schema:publisher Ne0761daa786045dcb09cb2e0de7d2585
41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000169108
42 https://doi.org/10.1007/978-3-642-28496-0_2
43 schema:sdDatePublished 2022-12-01T06:50
44 schema:sdLicense https://scigraph.springernature.com/explorer/license/
45 schema:sdPublisher Nadd96816284e4d08aaaf11b97971a291
46 schema:url https://doi.org/10.1007/978-3-642-28496-0_2
47 sgo:license sg:explorer/license/
48 sgo:sdDataset chapters
49 rdf:type schema:Chapter
50 N0c467150faca4f41b676508f67227a70 rdf:first Ne19d8a5bed1044af995c278157638281
51 rdf:rest rdf:nil
52 N107da495acbf4a59b8da57ca3accfce6 rdf:first sg:person.014232271321.52
53 rdf:rest N7708aa5feaf14bd584be8d8d69092ef0
54 N1f24fc47d33d4380bbaf62099689641e schema:isbn 978-3-642-28495-3
55 978-3-642-28496-0
56 schema:name Selected Areas in Cryptography
57 rdf:type schema:Book
58 N5daf8bc99ac1402187a3edfe4e6fc8eb schema:familyName Miri
59 schema:givenName Ali
60 rdf:type schema:Person
61 N7708aa5feaf14bd584be8d8d69092ef0 rdf:first sg:person.013206304341.94
62 rdf:rest Nc3cc2a107d724e37833817434528e4ca
63 N964aa039c8c94e119fe829d6d02ce0ce rdf:first N5daf8bc99ac1402187a3edfe4e6fc8eb
64 rdf:rest N0c467150faca4f41b676508f67227a70
65 Nadd96816284e4d08aaaf11b97971a291 schema:name Springer Nature - SN SciGraph project
66 rdf:type schema:Organization
67 Nc3cc2a107d724e37833817434528e4ca rdf:first sg:person.015166313415.52
68 rdf:rest rdf:nil
69 Ndba0c7c556f04a8aac1f5991748b041c schema:name dimensions_id
70 schema:value pub.1000169108
71 rdf:type schema:PropertyValue
72 Ne0761daa786045dcb09cb2e0de7d2585 schema:name Springer Nature
73 rdf:type schema:Organisation
74 Ne19d8a5bed1044af995c278157638281 schema:familyName Vaudenay
75 schema:givenName Serge
76 rdf:type schema:Person
77 Ne83da8da0be14fd9bef3173eb63f2ac0 schema:name doi
78 schema:value 10.1007/978-3-642-28496-0_2
79 rdf:type schema:PropertyValue
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.410380.e
87 schema:familyName Naya-Plasencia
88 schema:givenName María
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
90 rdf:type schema:Person
91 sg:person.014232271321.52 schema:affiliation grid-institutes:grid.5607.4
92 schema:familyName Jean
93 schema:givenName Jérémy
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014232271321.52
95 rdf:type schema:Person
96 sg:person.015166313415.52 schema:affiliation grid-institutes:grid.410413.3
97 schema:familyName Schläffer
98 schema:givenName Martin
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015166313415.52
100 rdf:type schema:Person
101 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
102 schema:name FHNW, Windisch, Switzerland
103 rdf:type schema:Organization
104 grid-institutes:grid.410413.3 schema:alternateName IAIK, Graz University of Technology, Austria
105 schema:name IAIK, Graz University of Technology, Austria
106 rdf:type schema:Organization
107 grid-institutes:grid.5607.4 schema:alternateName Ecole Normale Supérieure, France
108 schema:name Ecole Normale Supérieure, France
109 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...