User Tools

Site Tools


wheesht

This is an old revision of the document!


Table of Contents

Wheesht

The Algorithm

  • Author(s): Peter Maxwell
  • CAESAR submission: Wheesht

Cryptanalysis

Type Nonce Queries Data Time Success probability Reference
Forgery $1$ $1$ Neves on newsgroup
Distinguisher $2^{70.3}$ Canteaut and Leurent 1)
(Encryption) key recovery $2^{10}$ $2^{200}$ Canteaut and Leurent 2)

1), 2) Distinguishing and Key-recovery Attacks against Wheesht
wheesht.1397204801.txt.gz · Last modified: 11/04/2014 08:26:41 by mmeh