The Hash Function Cheetah : Specification and Supporting Documentation

1 Specification 2 1.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Hash function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Compression function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.1 Cheetah-224 and Cheetah-256 . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3.2 Cheetah-384 and Cheetah-512 . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.4 Cheetah as PRF and MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.5 Other digest sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

[1]  Bruce Schneier,et al.  Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..

[2]  Thomas Peyrin Cryptanalysis of Grindahl , 2007, ASIACRYPT.

[3]  Antoine Joux,et al.  Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.

[4]  Ralph C. Merkle,et al.  One Way Hash Functions and DES , 1989, CRYPTO.

[5]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[6]  Christophe De Cannière,et al.  Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.

[7]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[8]  Serge Vaudenay,et al.  Perfect Diffusion Primitives for Block Ciphers , 2004, Selected Areas in Cryptography.

[9]  Eli Biham,et al.  A Framework for Iterative Hash Functions - HAIFA , 2007, IACR Cryptol. ePrint Arch..

[10]  M. Bellare,et al.  HMAC: Keyed-Hashing for Message Authentication, RFC 2104 , 2000 .

[11]  Vincent Rijmen,et al.  The Wide Trail Design Strategy , 2001, IMACC.

[12]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[13]  Shoichi Hirose,et al.  A Simple Variant of the Merkle–Damgård Scheme with a Permutation , 2007, Journal of Cryptology.

[14]  John Kelsey,et al.  Herding Hash Functions and the Nostradamus Attack , 2006, EUROCRYPT.

[15]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[16]  Lars R. Knudsen,et al.  The Grindahl Hash Functions , 2007, FSE.

[17]  Ingrid Verbauwhede,et al.  Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm , 2001, CHES.

[18]  Joos Vandewalle,et al.  Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.