Abstract
Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise the need for alternatives. The Twister hash function is developed by a team by Ewan Fleischmann in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the National Institute of Standards and Technology. In this paper, introduces the logic structure of Twister algorithm. Using the structure advantage of FPGA hardware devices and give the FPGA Design and Implementation project of Twister algorithm. Final the timing simulation of some modules were given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dobbertin, H.: Cryptanalysis of MD4. Journal of Cryptology 11(4), 253–271 (1998)
Kim, J., Biryukov, A., Preneel, B., Lee, S.: On the Security of Encryption Modes of MD4,MD5 and HAVAL. Cryptology ePrint Archive, report 2005/327
Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)
Stevens, M.: Fast Collision Attack on MD5. Cryptology ePrint Archive, report 2006/104
Klima, V.: Finding MD5 Collisions-a Toy For a Notebook, Cryptology ePrint Archive, Report 2005/075
Klima, V.: Finding MD5 Collisions on a Notebook PC Using Multi-message Modications, Cryptology ePrint Archive, Report 2005/102
Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute, Cryptology ePrint Archive, Report 2006/105
Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56–71. Springer, Heidelberg (1998)
Wang, X., Yin, Y.L., Yu, H.: Collision Search Attacks on SHA1, research summary (2005)
Hawkes, P., Paddon, M., Rose, G.: On Corrective Patterns for the SHA-2 Family, Cryptology ePrint Archive, Report 2004/207
Fleischmann, E., Forler, C., Gorski, M.: The Twister Hash Function Family, October 28 (2008), http://www.twister-hash.com
Yi, X., Cheng, S.X., You, X.H., Lam, K.Y.: A Method for Obtaining Cryptographically Strong 8x8 S-boxes. In: IEEE Global Elecommunications Conference, GLOBECOM 1997, vol. 2, pp. 689–693 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lei, Z. (2011). Design and Implementation of Twister Algorithm Based on FPGA. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_83
Download citation
DOI: https://doi.org/10.1007/978-3-642-23214-5_83
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23213-8
Online ISBN: 978-3-642-23214-5
eBook Packages: Computer ScienceComputer Science (R0)