User Tools

Site Tools


wheesht

This is an old revision of the document!


Table of Contents

Wheesht

The Algorithm

  • Author(s): Peter Maxwell
  • CAESAR submission: Wheesht

Cryptanalysis

Type Nonce Queries Data Time Probability of success Reference
Forgery $1$ $1$ Neves (link)
Distinguisher $2^{70.3}$ Canteaut and Leurent 1)
(Encryption) key recovery $2^{10}$ $2^{200}$ Canteaut and Leurent 2)

1), 2) Distinguishing and Key-recovery Attacks against Wheesht
wheesht.1395915295.txt.gz · Last modified: 27/03/2014 10:14:55 by mmeh