Caligo, an Extensible Block Cipher -and- CHash, a Caligo Based Hash

نویسنده

  • Alexis W. Machado
چکیده

The Caligo operations are performed on whole blocks only. No subdivision passes through an s-box or a Feistel network. The cipher definition is the same for any block size, allowing exhaustive search for statistical deviations on small block variants. I also propose CHash, a hash function that takes advantage of the cipher extensibility and resists the extension attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of widely used models for predicting BRCA1 and BRCA2 mutations.

F Marroni, P Aretini, E D’Andrea, M A Caligo, L Cortesi, A Viel, E Ricevuto, M Montagna, G Cipollini, S Ferrari, M Santarosa, R Bisegna, J E Bailey-Wilson, G Bevilacqua, G Parmigiani, S Presciuttini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

متن کامل

LETTER TO JMG Evaluation of widely used models for predicting BRCA1 and BRCA2 mutations

F Marroni, P Aretini, E D’Andrea, M A Caligo, L Cortesi, A Viel, E Ricevuto, M Montagna, G Cipollini, S Ferrari, M Santarosa, R Bisegna, J E Bailey-Wilson, G Bevilacqua, G Parmigiani, S Presciuttini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

متن کامل

The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method

This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on passwords, high-entropy shared keys, and public key certificates. EAP-IKEv2 further ...

متن کامل

Visual sensitivity in the crepuscular owl butterfly Caligo memnon and the diurnal blue morpho Morpho peleides: a clue to explain the evolution of nocturnal apposition eyes?

Insects active in dim light, such as moths and many beetles, normally have superposition compound eyes to increase photon capture. But there are nocturnal and crepuscular insects - such as some species of bees, wasps and butterflies - that have apposition compound eyes. These are likely to have adaptations - including large eye and facet size and coarsened spatial and temporal resolution - that...

متن کامل

Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function

This article discusses the provable security of pseudorandom-function (PRF) modes of an iterated hash function using a block cipher. The iterated hash function uses the Matyas-Meyer-Oseas (MMO) mode for the compression function and the Merkle-Damgård with a permutation (MDP) for the domain extension transform. It is shown that the keyed-via-IV mode and the key-prefix mode of the iterated hash f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006