View Single Post
Old 08-27-2018, 04:06
dila dila is offline
Join Date: Jan 2010
Posts: 60
Rept. Given: 12
Rept. Rcvd 32 Times in 14 Posts
Thanks Given: 35
Thanks Rcvd at 74 Times in 20 Posts
dila Reputation: 32
Yes that sounds right. You can use techniques from linear cryptanalysis. My understanding is that this will lead to linear approximations for the function, but note that in this case the approximation will be exact, which should mean there is less computation involved.

By the way, if you solve the challenge you can give your solution as SHA256(your_name||solution) so that your solution is hidden but can be verified.
Reply With Quote
The Following User Says Thank You to dila For This Useful Post:
chants (08-27-2018)