Abstract
We present a cryptographic module that can be used both as a cryptographic hash function and as a stream cipher. High performance is achieved through a combination of low work-factor and a high degree of parallelism. Throughputs of 5.1 bits/cycle for the hashing mode and 4.7 bits/cycle for the stream cipher mode are demonstrated on a commercially available VLIW micro-processor.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.
A. Bosselaers, R. Govaerts, J. Vandewalle, “Fast Hashing on the Pentium”, Advances in Cryptology — Proceedings Crypto’96 LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298–312.
C.S.K. Clapp, “Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 273–287.
J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,” Doctoral Dissertation, March 1995, K.U.Leuven.
H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160: A Strengthened version of RIPEMD,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71–82.
FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.
FIPS 180-1, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995.
B. Preneel and P.C. van Oorschot, “On the Security of Two MAC Algorithms”, Advances in Cryptology — Proceedings Eurocrypt’96 LNCS 1070, U.M. Maurer, Ed., Springer-Verlag, 1996, pp. 19–32.
R.L. Rivest, The MD4 message-digest algorithm, Request for comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
R.L. Rivest, The MD5 message-digest algorithm, Request for comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
P. Rogaway and D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 56–63.
B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 397–398.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daemen, J., Clapp, C. (1998). Fast Hashing and Stream Encryption with Panama . In: Vaudenay, S. (eds) Fast Software Encryption. FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69710-1_5
Download citation
DOI: https://doi.org/10.1007/3-540-69710-1_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64265-7
Online ISBN: 978-3-540-69710-7
eBook Packages: Springer Book Archive