Cryptanalysis of Haraka

In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function evaluations. Second, we invalidate the preimage securit...

Full description

Bibliographic Details
Main Author: Jérémy Jean
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2016-12-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/531