SMASH (hash)
   HOME





SMASH (hash)
SMASH is a cryptographic hash function which was created by Lars R. Knudsen.Knudsen, Lars R.SMASH - A Cryptographic Hash Function Accessed 23 November 2009 SMASH comes in two versions: 256-bit and 512-bit. Each version was supposed to rival SHA-256 and SHA-512, respectively, however, shortly after the SMASH presentation at FSE 2005, an attack vector against SMASH was discovered which left the hash broken. Specifications The message length was limited to less than 2128 for SMASH-256 and 2256 for SMASH-512. Definition Input: 256/512-bit message blocks m_1, m_2, ... ,m_t and \theta \in GF(2^n) * h_0 = f(iv) \oplus iv * h_i = h(h_,m_i) = f(h_\oplus m_i) \oplus m_i \oplus \theta m_i * h_ = f(h_t) \oplus h_t The function f is a complex compression function consisting of H-Rounds and L-Rounds using S-boxes, linear diffusion In cryptography, confusion and diffusion are two properties of a secure cipher identified by Claude Shannon in his 1945 classified report ''A Math ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Lars R
Lars is a common male name in Scandinavian countries. Origin ''Lars'' means "from the city of Laurentum". Lars is derived from the Latin name Laurentius, which means "from Laurentum" or "crowned with laurel", and is therefore related to the name Laurence and Lauren. A homonymous Etruscan name was borne by several Etruscan kings, and later used as a last name by the Roman Lartia family. The etymology of the Etruscan name is unknown. Notable people *, bishop of Linköping (1236–1258) *, bishop of Linköping (1292–1307) *Lars (archbishop of Uppsala) (1255–1267) *Lars Kristian Abrahamsen (1855–1921), Norwegian politician *Lars Ahlfors (1907–1996), Finnish Fields Medal recipient * Lars Amble (1939–2015), Swedish actor and director *Lars Herminius Aquilinus, ancient Roman consul *Lars Bak (born 1980), Danish road bicycle racer *Lars Bak (computer programmer) (born 1965), Danish computer programmer *Lars Beckman (born 1967), Swedish politician *Lars Bender (born 1989), Ger ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptographic Hash Function
A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: * the probability of a particular n-bit output result (hash value) for a random input string ("message") is 2^ (as for any good hash), so the hash value can be used as a representative of the message; * finding an input string that matches a given hash value (a ''pre-image'') is infeasible, ''assuming all input strings are equally likely.'' The ''resistance'' to such search is quantified as security strength: a cryptographic hash with n bits of hash value is expected to have a ''preimage resistance'' strength of n bits, unless the space of possible input values is significantly smaller than 2^ (a practical example can be found in ); * a ''second preimage'' resistance strength, with the same expectations, refers to a similar problem of f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SHA-256
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher. SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256. SHA-256 and SHA-512 are hash functions whose digests are eight 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. SHA-224 and SHA-384 are truncated versions of SHA-256 and SHA-512 respectively, computed with different initial values. SHA-512/224 and SHA-512/256 are also trunc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SHA-512
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression function itself built using the One-way compression function#Davies–Meyer, Davies–Meyer structure from a specialized block cipher. SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256. SHA-256 and SHA-512 are hash functions whose digests are eight 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. SHA-224 and SHA-384 are truncated versions of SHA-256 and SHA-512 respectively, computed with different initial values. S ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




FSE 2005
FSE may refer to: Organizations * Federation of European Scouting (other) (French: ') * Ferrovie del Sud Est, an Italian railway company * Football Supporters Europe, a football fan network * Fung Seng Enterprises, a Hong Kong conglomerate * Franciscan Sisters of the Eucharist, a Roman Catholic religious congregation Computing * Fast Software Encryption, cryptography conference * Finite-state entropy, entropy coding scheme Finance * Frankfurt Stock Exchange, Germany's largest stock exchange * Fukuoka Stock Exchange, a stock exchange in Japan Human and veterinary medicine * Feline spongiform encephalopathy * Fetal scalp electrode Science and technology * Fast Spin Echo, a type of magnetic resonance imaging sequence * Free surface effect, liquids in slack tanks Other * Finnish Sign Language (fse), the ISO languagecode for the Finnish sign language * Fremont Street Experience The Fremont Street Experience (FSE) is a pedestrian mall and attraction in downtown ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


S-boxes
In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to obscure the relationship between the key and the ciphertext, thus ensuring Shannon's property of confusion. Mathematically, an S-box is a nonlinear vectorial Boolean function. In general, an S-box takes some number of input bits, ''m'', and transforms them into some number of output bits, ''n'', where ''n'' is not necessarily equal to ''m''. An ''m''×''n'' S-box can be implemented as a lookup table with 2''m'' words of ''n'' bits each. Fixed tables are normally used, as in the Data Encryption Standard (DES), but in some ciphers the tables are generated dynamically from the key (e.g. the Blowfish and the Twofish encryption algorithms). Example One good example of a fixed table is the S-box from DES (S5), mapping 6-bit input into a 4-bit output: Given a 6-bit input, the 4-bit output is found by selecting the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Linear Diffusion
In cryptography, confusion and diffusion are two properties of a secure cipher identified by Claude Shannon in his 1945 classified report ''A Mathematical Theory of Cryptography''. These properties, when present, work together to thwart the application of statistics, and other methods of cryptanalysis. Confusion in a symmetric cipher is obscuring the local correlation between the input (plaintext), and output (ciphertext) by varying the application of the key to the data, while diffusion is hiding the plaintext statistics by spreading it over a larger area of ciphertext. Although ciphers can be confusion-only (substitution cipher, one-time pad) or diffusion-only (transposition cipher), any "reasonable" block cipher uses both confusion and diffusion. These concepts are also important in the design of cryptographic hash functions, and pseudorandom number generators, where decorrelation of the generated values is the main feature. Diffusion (and its avalanche effect) is also applic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Serpent (cipher)
Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard process, Advanced Encryption Standard (AES) contest, in which it ranked second to Rijndael. Serpent was designed by Ross J. Anderson, Ross Anderson, Eli Biham, and Lars Knudsen. Like other Advanced Encryption Standard, AES submissions, Serpent has a block size (cryptography), block size of 128 bits and supports a key size of 128, 192, or 256 bits. The cipher is a 32-round substitution–permutation network operating on a block of four 32-bit Word (computer architecture), words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. Serpent was designed so that all operations can be executed in parallel computing, parallel, using 32 bit slices. This maximizes parallelism but also allows use of the extensive cryptanalysis work performed on Data Encryption Standard, DES. Serpent took a conservative approach to security, opting for a large security margin: the design ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]