Results 1 
8 of
8
RIPEMD160: A Strengthened Version of RIPEMD
, 1996
"... Abstract. Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years, several fast software hash functions have been proposed; most of them are based on the des ..."
Abstract

Cited by 103 (12 self)
 Add to MetaCart
Abstract. Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years, several fast software hash functions have been proposed; most of them are based on the design principles of Ron Rivest’s MD4. One such proposal was RIPEMD, which was developed in the framework of the EU project RIPE (Race Integrity Primitives Evaluation). Because of recent progress in the cryptanalysis of these hash functions, we propose a new version of RIPEMD with a 160bit result, as well as a plugin substitute for RIPEMD with a 128bit result. We also compare the software performance of several MD4based algorithms, which is of independent interest. 1
Twofish: A 128Bit Block Cipher
 in First Advanced Encryption Standard (AES) Conference
, 1998
"... Twofish is a 128bit block cipher that accepts a variablelength key up to 256 bits. The cipher is a 16round Feistel network with a bijective F function made up of four keydependent 8by8bit Sboxes, a fixed 4by4 maximum distance separable matrix over GF(2 8 ), a pseudoHadamard transform, bit ..."
Abstract

Cited by 54 (8 self)
 Add to MetaCart
Twofish is a 128bit block cipher that accepts a variablelength key up to 256 bits. The cipher is a 16round Feistel network with a bijective F function made up of four keydependent 8by8bit Sboxes, a fixed 4by4 maximum distance separable matrix over GF(2 8 ), a pseudoHadamard transform, bitwise rotations, and a carefully designed key schedule. A fully optimized implementation of Twofish encrypts on a Pentium Pro at 17.8 clock cycles per byte, and an 8bit smart card implementation encrypts at 1660 clock cycles per byte. Twofish can be implemented in hardware in 14000 gates. The design of both the round function and the key schedule permits a wide variety of tradeoffs between speed, software size, key setup time, gate count, and memory. We have extensively cryptanalyzed Twofish; our best attack breaks 5 rounds with 2 22.5 chosen plaintexts and 2 51 effort.
A Generalized Birthday Problem (extended abstract)
 In Advances in Cryptology – CRYPTO 2002
, 2002
"... We study a kdimensional generalization of the birthday problem: given k lists of nbit values, and some way to choose one element from each list so that the resulting k values xor to zero. For k = 2, this is just the extremely wellknown birthday problem, which has a squareroot time algorithm with ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
We study a kdimensional generalization of the birthday problem: given k lists of nbit values, and some way to choose one element from each list so that the resulting k values xor to zero. For k = 2, this is just the extremely wellknown birthday problem, which has a squareroot time algorithm with many applications in cryptography. In this paper, we show new algorithms for the case k > 2: we show a cuberoot time algorithm for the case of k = 4 lists, and we give an algorithm with subexponential running time when k is unrestricted.
A Universal Encryption Standard
, 2000
"... DES and tripleDES are two wellknown and popular encryption algorithms, but they both have the same drawback: their block size is limited to 64 bits. While the cryptographic community is working hard to select and evaluate candidates and finalists for the AES (Advanced Encryption Standard) cont ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
DES and tripleDES are two wellknown and popular encryption algorithms, but they both have the same drawback: their block size is limited to 64 bits. While the cryptographic community is working hard to select and evaluate candidates and finalists for the AES (Advanced Encryption Standard) contest launched by NIST in 1997, it might be of interest to propose a secure and simple double blocklength encryption algorithm. More than in terms of key length and block size, our Universal Encryption Standard is a new construction that remains totally compliant with DES and tripleDES specifications as well as with AES requirements.
CryptoBytes
"... this article particularly interesting. Perhaps the most remarkable cryptanalytic developments over the last year or two have been the advances made in the analysis of hash functions by Hans Dobbertin. The net result of this work has been a lack of options in the hash functions that are available for ..."
Abstract
 Add to MetaCart
this article particularly interesting. Perhaps the most remarkable cryptanalytic developments over the last year or two have been the advances made in the analysis of hash functions by Hans Dobbertin. The net result of this work has been a lack of options in the hash functions that are available for longterm use. In Europe, however, RIPEMD160 has been gaining in popularity and the designers of this algorithm provide us with a summary of its features in this issue of the newsletter. Finally, at the 1997 Crypto conference attendees honored the work of Oded Goldreich. As one of the pioneers in establishing a theoretical framework to today's cryptography Oded's invited lecture was one of the highlights of the conference. In our lead article Oded provides us with his perspective on the foundations of modern cryptography. The future success of CryptoBytes depends on input from all sectors of the cryptographic community, and as usual we would like very much to thank the writers who have contributed to this second issue of the third volume. We encourage any readers with comments, opposite opinions, suggestions or proposals for future issues to contact the CryptoBytes editor at RSA Laboratories or by Email to bytesed@rsa.com. CRYPTOBYTES T H E T E C H N I C A L N E W S L E T T E R O F R S A L A B O R A T O R I E S  A U T U M N 1 9 9 7 3
On the Computational Asymmetry of the Sboxes Present in Blue Midnight Wish Cryptographic Hash Function
"... Abstract. Blue Midnight Wish hash function is one of 14 candidate functions that are continuing in the Second Round of the SHA3 competition. In its design it has several Sboxes (bijective components) that transform 32bit or 64bit values. Although they look similar to the Sboxes in SHA2, they a ..."
Abstract
 Add to MetaCart
Abstract. Blue Midnight Wish hash function is one of 14 candidate functions that are continuing in the Second Round of the SHA3 competition. In its design it has several Sboxes (bijective components) that transform 32bit or 64bit values. Although they look similar to the Sboxes in SHA2, they are also different. It is well known fact that the design principles of SHA2 family of hash functions are still kept as a classified NSA information. However, in the open literature there have been several attempts to analyze those design principles. In this paper first we give an observation on the properties of SHA2 Sboxes and then we investigate the same properties in Blue Midnight Wish. 1
1 The Cryptographic Hash Function RIPEMD160
"... RIPEMD160 is a fast cryptographic hash function that is tuned towards software implementations on 32bit architectures. It has evolved from the 256bit extension of MD4, which was introduced in 1990 by Ron Rivest [20, 21]. Its main design feature are two different and independent parallel chains, t ..."
Abstract
 Add to MetaCart
RIPEMD160 is a fast cryptographic hash function that is tuned towards software implementations on 32bit architectures. It has evolved from the 256bit extension of MD4, which was introduced in 1990 by Ron Rivest [20, 21]. Its main design feature are two different and independent parallel chains, the result of
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix
"... Abstract. An MDS matrix is an important building block adopted by different algorithms that provides diffusion and therefore, has been an area of active research. In this paper, we present an idea of direct exponent and direct square of a matrix. We prove that direct square of an MDS matrix results ..."
Abstract
 Add to MetaCart
Abstract. An MDS matrix is an important building block adopted by different algorithms that provides diffusion and therefore, has been an area of active research. In this paper, we present an idea of direct exponent and direct square of a matrix. We prove that direct square of an MDS matrix results in an MDS matrix whereas direct exponent may not be an MDS matrix. We also delineate direct exponent class and scalar multiplication class of an MDS matrix and determine the number of elements in these classes. In the end, we discuss the standing of design properties of a cryptographic primitive by replacing MDS matrix by dynamic one.