What is it about?

Use the classical boomerang attack on round-reduced BLAKE and BLAKE2 hash functions. It is surprising to find that the elimination of the round constants in BLAKE2 increase its secure margin against the boomerang attack.

Featured Image

Why is it important?

BLAKE is one of the 5 finalist of the SHA-3 competition. It is also an international standard used worldwide. Therefore, it is important to evaluate its security against all kinds of attacks including the boomerang attack.

Read the Original

This page is a summary of: The Boomerang Attacks on BLAKE and BLAKE2, January 2015, Springer Science + Business Media,
DOI: 10.1007/978-3-319-16745-9_16.
You can read the full text:

Read

Contributors

The following have contributed to this page