Outline Introduction Grindahl Design considerations Concluding remarks
The Grindahl hash functions
Søren S. Thomsen joint work with Lars R. Knudsen Christian Rechberger Fast Software Encryption March 26–28, 2007 Luxembourg
1 / 17
The Grindahl hash functions Sren S. Thomsen joint work with Lars - - PowerPoint PPT Presentation
Outline Introduction Grindahl Design considerations Concluding remarks The Grindahl hash functions Sren S. Thomsen joint work with Lars R. Knudsen Christian Rechberger Fast Software Encryption March 2628, 2007 Luxembourg 1 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
1 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
1 Introduction 2 Grindahl 3 Design considerations 4 Concluding remarks
2 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
3 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
Introduce difference “Undo” difference as quickly as possible (probabilistic)
4 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
5 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
6 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
7 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
8 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
9 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
10 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
11 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
12 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
13 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
14 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
15 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
two instances, Grindahl-256 and Grindahl-512 large class of hash functions (highly parameterizable) can also be used as compression function
quick diffusion high degree of non-linearity fast implementations across platforms implementation research “reusable” from the AES low memory requirements
16 / 17
Outline Introduction Grindahl Design considerations Concluding remarks
17 / 17