Fast Hashing and Stream Encryption with Panama

  • Joan Daemen
  • Craig Clapp
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1372)

Abstract

We present a cryptographic module that can be used both as a cryptographic hash function and as a stream cipher. High performance is achieved through a combination of low work-factor and a high degree of parallelism. Throughputs of 5.1 bits/cycle for the hashing mode and 4.7 bits/cycle for the stream cipher mode are demonstrated on a commercially available VLIW micro-processor.

References

  1. 1.
    E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.MATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    A. Bosselaers, R. Govaerts, J. Vandewalle, “Fast Hashing on the Pentium”, Advances in Cryptology — Proceedings Crypto’96 LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298–312.Google Scholar
  3. 3.
    C.S.K. Clapp, “Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 273–287.CrossRefGoogle Scholar
  4. 4.
    J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,” Doctoral Dissertation, March 1995, K.U.Leuven.Google Scholar
  5. 5.
    H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160: A Strengthened version of RIPEMD,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71–82.Google Scholar
  6. 6.
    FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.Google Scholar
  7. 7.
    FIPS 180-1, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995.Google Scholar
  8. 8.
    B. Preneel and P.C. van Oorschot, “On the Security of Two MAC Algorithms”, Advances in Cryptology — Proceedings Eurocrypt’96 LNCS 1070, U.M. Maurer, Ed., Springer-Verlag, 1996, pp. 19–32.Google Scholar
  9. 9.
    R.L. Rivest, The MD4 message-digest algorithm, Request for comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.Google Scholar
  10. 10.
    R.L. Rivest, The MD5 message-digest algorithm, Request for comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.Google Scholar
  11. 11.
    P. Rogaway and D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 56–63.Google Scholar
  12. 12.
    B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996, pp. 397–398.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Joan Daemen
    • 1
  • Craig Clapp
    • 2
  1. 1.BanksysBrusselBelgium
  2. 2.PictureTel CorporationAndoverUSA

Personalised recommendations