Snefru
   HOME

TheInfoList



OR:

Snefru is a
cryptographic hash function A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: ...
invented by
Ralph Merkle Ralph C. Merkle (born February 2, 1952) is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics. M ...
in 1990 while working at
Xerox PARC Future Concepts division (formerly Palo Alto Research Center, PARC and Xerox PARC) is a research and development company in Palo Alto, California. It was founded in 1969 by Jacob E. "Jack" Goldman, chief scientist of Xerox Corporation, as a div ...
. The function supports 128-bit and 256-bit output. It was named after the
Egyptian ''Egyptian'' describes something of, from, or related to Egypt. Egyptian or Egyptians may refer to: Nations and ethnic groups * Egyptians, a national group in North Africa ** Egyptian culture, a complex and stable culture with thousands of year ...
Pharaoh Pharaoh (, ; Egyptian language, Egyptian: ''wikt:pr ꜥꜣ, pr ꜥꜣ''; Meroitic language, Meroitic: 𐦲𐦤𐦧, ; Biblical Hebrew: ''Parʿō'') was the title of the monarch of ancient Egypt from the First Dynasty of Egypt, First Dynasty ( ...
Sneferu Sneferu or Soris (c. 2600 BC) was an ancient Egyptian monarch and the first pharaoh of the Fourth Dynasty of Egypt, during the earlier half of the Old Kingdom period (26th century BC). He introduced major innovations in the design and constructio ...
, continuing the tradition of the
Khufu Khufu or Cheops (died 2566 BC) was an ancient Egyptian monarch who was the second pharaoh of the Fourth Dynasty of Egypt, Fourth Dynasty, in the first half of the Old Kingdom of Egypt, Old Kingdom period (26th century BC). Khufu succeeded his ...
and
Khafre Khafre or Chephren (died 2532 BC) was an ancient Egyptian monarch who was the fourth king of the Fourth Dynasty, during the earlier half of the Old Kingdom period (c. 2700–2200 BC). He was son of the king Khufu, and succeeded his broth ...
block cipher In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called ''blocks''. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage a ...
s. The original design of Snefru was shown to be insecure by
Eli Biham Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
and
Adi Shamir Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
who were able to use
differential cryptanalysis Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can a ...
to find hash collisions. The design was then modified by increasing the number of iterations of the main pass of the algorithm from two to eight. Although differential cryptanalysis can break the revised version with less complexity than
brute force search In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique and algorithmic paradigm that consists of systematically checking all possible candidates for whether or n ...
(a certificational weakness), the attack requires 2^ operations and is thus not currently feasible in practice.


References


External links

* on Ecrypt * , an
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
command-line tool, which can calculate and verify Snefru-128 and Snefru-256 Broken hash functions {{crypto-stub