[147675] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] please dont weaken pre-image resistance of SHA3

daemon@ATHENA.MIT.EDU (Adam Back)
Tue Oct 15 14:53:45 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 15 Oct 2013 20:22:50 +0200
From: Adam Back <adam@cypherspace.org>
To: John Kelsey <crypto.jmk@gmail.com>
In-Reply-To: <6C1141E5-B7AC-46F6-8C7E-744B61E1C894@gmail.com>
Cc: Adam Back <adam@cypherspace.org>,
	"cryptography@metzdowd.com" <cryptography@metzdowd.com>,
	ianG <iang@iang.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


On Tue, Oct 15, 2013 at 03:09:58AM -0400, John Kelsey wrote:
>On Oct 14, 2013, at 4:17 PM, ianG <iang@iang.org> wrote:
>...
>> What is the preimage protection of SHA3-512 when truncated to 256?  It
>> seems that SHA3-384 still gets 256.
>
>If the capacity is c bits, then preimages are never more than 2^{c/2} bits. 
> So SHA3-512 as proposed in my CHES slides would have preimage resistance
> of 256 bits.

Are you including truncation in that?  (The question was would SHA3-512
STILL have 256-bit preimage security if it was truncated to 256-bit ie
motivated by a workaround to get a 256-bit output with conventional 256-bit
preimage resistance).

Adam
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post