Abstract
We present a cryptographic module that can be used both as a cryptographic hash function and as a stream cipher. High performance is achieved through a combination of low work-factor and a high degree of parallelism. Throughputs of 5.1 bits/cycle for the hashing mode and 4.7 bits/cycle for the stream cipher mode are demonstrated on a commercially available VLIW micro-processor.
Chapter PDF
References
E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.
A. Bosselaers, R. Govaerts, J. Vandewalle, “Fast Hashing on the Pentium”, Advances in Cryptology — Proceedings Crypto’96 LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298–312.
C.S.K. Clapp, “Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 273–287.
J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,” Doctoral Dissertation, March 1995, K.U.Leuven.
H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160: A Strengthened version of RIPEMD,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71–82.
FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.
FIPS 180-1, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995.
B. Preneel and P.C. van Oorschot, “On the Security of Two MAC Algorithms”, Advances in Cryptology — Proceedings Eurocrypt’96 LNCS 1070, U.M. Maurer, Ed., Springer-Verlag, 1996, pp. 19–32.
R.L. Rivest, The MD4 message-digest algorithm, Request for comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
R.L. Rivest, The MD5 message-digest algorithm, Request for comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
P. Rogaway and D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 56–63.
B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 397–398.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daemen, J., Clapp, C. (1998). Fast Hashing and Stream Encryption with Panama . In: Vaudenay, S. (eds) Fast Software Encryption. FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69710-1_5
Download citation
DOI: https://doi.org/10.1007/3-540-69710-1_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64265-7
Online ISBN: 978-3-540-69710-7
eBook Packages: Springer Book Archive