kryptoslogic.blogspot.com
Kryptos Logic Research: October 2012
http://kryptoslogic.blogspot.com/2012_10_01_archive.html
Saturday, October 6, 2012. Exactly 12 years after announcing Rijndael. As AES, NIST has done it again. Keccak has been hailed as the SHA-3 winner. Congratulations to the Keccak team, who have designed an amazingly elegant hash, and in particular to Joan Daemen, who has now won 2 NIST competitions! SHA-3 originated amidst fears that SHA-2, the current NIST hashing standard, was wounded after the breakthrough. Among which are length-extension attacks. Which relies on a fixed-width permutation (f ). Disting...
stbuehler.de
stbuehler.de - Stefan's Blog
http://stbuehler.de/blog
Type punning with unions. Don’t use unions for type punning; always use. Sometimes you might want to reinterpret a value of one type as value of another type. For example you might have an integer parameter, but you know that it actually contains a float value. Let’s assume the integer was large enough to store the float somehow, and now you want to get the value back. If you follow wikipedia. You might do something like this:. But if you start using pointers (or references in C ) this can fail very fast:.
en.wikipedia.org
SHA-2 - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/SHA2
From Wikipedia, the free encyclopedia. PUB 180-4, CRYPTREC. 224, 256, 384, or 512 bits. With Davies Meyer compression function. A 2011 attack breaks preimage resistance. For 57 out of 80 rounds of SHA-512, and 52 out of 64 rounds for SHA-256. Pseudo-collision attack against up to 46 rounds of SHA-256. Secure Hash Algorithm 2. Is a set of cryptographic hash functions. Designed by the National Security Agency. SHA stands for Secure Hash Algorithm. The SHA-2 family consists of six hash functions with digests.
en.wikipedia.org
SHA-2 - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/SHA-2
From Wikipedia, the free encyclopedia. PUB 180-4, CRYPTREC. 224, 256, 384, or 512 bits. With Davies Meyer compression function. A 2011 attack breaks preimage resistance. For 57 out of 80 rounds of SHA-512, and 52 out of 64 rounds for SHA-256. Pseudo-collision attack against up to 46 rounds of SHA-256. Secure Hash Algorithm 2. Is a set of cryptographic hash functions. Designed by the National Security Agency. SHA stands for Secure Hash Algorithm. The SHA-2 family consists of six hash functions with digests.
en.wikipedia.org
SHA-1 - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/SHA-1
From Wikipedia, the free encyclopedia. PUB 180-4, CRYPTREC. A 2011 attack by Marc Stevens can produce hash collisions with a complexity between 2. As of October 2015. No actual collisions are publicly known. Secure Hash Algorithm 1. Is a cryptographic hash function. Designed by the United States National Security Agency. And is a U.S. Federal Information Processing Standard. Published by the United States NIST. SHA-1 produces a 160- bit. Hash value known as a message digest. Number, 40 digits long. The o...
keccak.noekeon.org
The Keccak sponge function family
http://keccak.noekeon.org/yes_this_is_keccak.html
And Gilles Van Assche. Our papers and presentations. Crunchy Crypto Collision and Pre-image Contest. The FIPS 202 standard. Files for the Keccak. Note on side-channel attacks and their countermeasures. Note on zero-sum distinguishers of Keccak. On alignment in Keccak. A flexible coding for tree hashing. A software interface for Keccak. Software and other files. Hardware implementation in VHDL. Pieces of state [ ODG. Step θ [ ODG. Step ρ [ ODG. Step π [ ODG. Step χ [ ODG. Yes, this is Keccak. 448, 512, 76...
keccak.noekeon.org
The Keccak sponge function family
http://keccak.noekeon.org/fips202final.html
And Gilles Van Assche. Our papers and presentations. Crunchy Crypto Collision and Pre-image Contest. The FIPS 202 standard. Files for the Keccak. Note on side-channel attacks and their countermeasures. Note on zero-sum distinguishers of Keccak. On alignment in Keccak. A flexible coding for tree hashing. A software interface for Keccak. Software and other files. Hardware implementation in VHDL. Pieces of state [ ODG. Step θ [ ODG. Step ρ [ ODG. Step π [ ODG. Step χ [ ODG. FIPS 202 is out: SHA-3 and Keccak.
keccak.noekeon.org
The Keccak sponge function family
http://keccak.noekeon.org/crunchy_reopens2014.html
And Gilles Van Assche. Our papers and presentations. Crunchy Crypto Collision and Pre-image Contest. The FIPS 202 standard. Files for the Keccak. Note on side-channel attacks and their countermeasures. Note on zero-sum distinguishers of Keccak. On alignment in Keccak. A flexible coding for tree hashing. A software interface for Keccak. Software and other files. Hardware implementation in VHDL. Pieces of state [ ODG. Step θ [ ODG. Step ρ [ ODG. Step π [ ODG. Step χ [ ODG. Crunchy crypto contest re-opens.