1 Cryptographic Hash Function EDON-R Presented by Prof. Danilo Gligoroski Department of Telematics Faculty of Information Technology, Mathematics and Electrical Engineering Norwegian University of Science and TechnologyTechnology - NTNU, NORWAY 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
2 Outline Short history of EDON-R Specific design characteristics Known attacks on EDON-R Are there any one-way bijections embedded in EDON-R? SW/HW performance and memory requirements 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
3 Short history of EDON-R • Theoretical principles of EDON-R were described at the Second NIST Hash Workshop – 2006 in the presentation: Edon-R Family of Cryptographic Hash Functions – No concrete realization 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
4 Short history of EDON-R • Theoretical principles of EDON-R were described at the Second NIST Hash Workshop – 2006 in the presentation: Edon-R Family of Cryptographic Hash Functions – No concrete realization • First implementation of Edon- R (256, 384, 512) published at http://eprint.iacr.org/2007/154 – Big acknowledgement for Søren Steffen Thomsen, giving me comments about zero being a fixed point in that realization 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
5 Short history of EDON-R • Additionally, the following contributors joined the EDON-R (SHA-3) team: – Rune Steinsmo Ødegård – Investigating the mathematical properties of defined quasigroups – Marija Mihova – Investigating the differential properties in EDON-R operations – Svein Johan Knapskog (general comments and suggestions for improvements, proofreading) – Ljupco Kocarev (general comments and suggestions for improvements, proofreading) – Aleš Drápal (Theory of quasigroups and suggestions for improvements) – Vlastimil Klima (cryptanalysis and suggestions for improvements) 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
6 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
7 Specific design characteristics for EDON-R Concatenation of at least 65 bits (Merkle-Damgård strenghtening) 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
8 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
9 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
10 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
11 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
12 Specific design characteristics for EDON-R Function is defined by quasigroup operations 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
13 Specific design characteristics for EDON-R Quasigroup operations are defined on 256-bit or 512-bit operands. 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
14 Specific design characteristics for EDON-R Quasigroup operations are defined on 256-bit or 512-bit operands. (X 0 , X 1 , …, X 7 ) (Y 0 , Y 1 , …, Y 7 ) 32-bit or 64-bit variables 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
15 Specific design characteristics for EDON-R Quasigroup operations are defined on 256-bit or 512-bit operands. (X 0 , X 1 , …, X 7 ) (Y 0 , Y 1 , …, Y 7 ) 32-bit or 64-bit variables Operations: 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
16 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
17 Specific design characteristics for EDON-R Simple re-indexing (no computational costs) 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
18 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
19 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
20 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
21 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
22 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
23 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
24 Specific design characteristics for EDON-R Rotations differ from each other for at least 2 positions. 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
25 Specific design characteristics for EDON-R Two orthogonal Latin Squares of order 8 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
26 Specific design characteristics for EDON-R Two orthogonal Latin Squares of order 8 Four corresponding nonsingular in (Z 2 , +, x ) matrices. 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
27 Specific design characteristics for EDON-R Four nonsingular in (Z 2 , +, x ) matrices. 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
28 Specific design characteristics for EDON-R Four nonsingular in (Z 2 , +, x ) matrices. Two diffusion (bi-stochastic) matrices 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
29 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
30 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
31 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
32 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
33 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
34 Specific design characteristics for EDON-R 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
35 Specific design characteristics for EDON-R Theorem 3: 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
36 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
37 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
38 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
39 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
40 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
41 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
42 Specific design characteristics for EDON-R EDON-R is provably resistant against differential cryptanalysis 25-28 Feb 2009, Leuven, Belgium, The First SHA-3 Candidate Conference, Cryptographic Hash Function EDON-R
Recommend
More recommend