Second Cryptographic Hash Workshop
R RADIO
ADIOG
GATÚN
ATÚN,
, a belt-and-mill hash function a belt-and-mill hash function
Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche
STMicroelectronics
*De Valck Consultants
, R ADIO G ATN , a belt-and-mill hash function a belt-and-mill - - PowerPoint PPT Presentation
R ADIO G ATN , R ADIO G ATN , a belt-and-mill hash function a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michal Peeters * and Gilles Van Assche STMicroelectronics * De Valck Consultants Second Cryptographic Hash Workshop
Second Cryptographic Hash Workshop
STMicroelectronics
*De Valck Consultants
Second Cryptographic Hash Workshop
Second Cryptographic Hash Workshop
Input block Round Input block Round ... Round Round Output block Round Output block ... Blank iterations
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
a10 a11 a12 a13 a14 a15 a16 a17 a18 a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 A10 A11 A12 A13 A14 A15 A16 A17 A18 A0 A1 A2 A3 A5 A4 A6 A7 A8 A9
1 3 6 10 15 21 28 36 45 55 66 78 91 105 120 136 153 171
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping
Second Cryptographic Hash Workshop
Mill Belt Input mapping Mill function Bell Milt Belt function
1 2 3 4 5 6 7 8 9 10 11 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping 12
Second Cryptographic Hash Workshop
Round ... DP
Round DP
Round DP
Second Cryptographic Hash Workshop
crowded round lonesome round weight input blocks right pairs coming out (neg. log.) right pairs entering (neg. log.) rounds backtracking cost
Second Cryptographic Hash Workshop
Second Cryptographic Hash Workshop
Dell Precision 670 with Intel Xeon 3GHz (in Mbyte/sec)
Second Cryptographic Hash Workshop