Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

2.2 The Threefish Block Cipher
2.5 Optional Arguments
2.6 Skein-MAC
2.7 Tree Hashing with Skein
3 A Full Specification of Skein
3.1 Strings
3.2 Bit and Byte Order
3.3 A Full Specification of Threefish
3.3.1 MIX Functions
3.3.2 The Key Schedule
3.3.3 Decryption
3.4 A Full Specification of UBI
3.5 A Full Specification of Skein
3.5.1 Type Values
3.5.2 The Configuration String
3.5.3 The Output Function
3.5.4 Simple Hashing
3.5.5 Full Skein
3.5.6 Tree Processing
4 Using Skein
4.1 Skein as a Hash Function
4.2 Tree Hashing with Skein
4.3 Skein as a MAC
4.4 HMAC
4.5 Randomized Hashing
4.6 Skein as a Hash Function for Digital Signatures
5.1 Software Performance
5.2 Hardware Performance
5.3 Threefish Software Performance
5.4 The Word Size As a Tunable Parameter
6 Skein Security Claims
6.1 Basic Security Claims for Skein
6.2 The Security of Skein’s Compression Function and the Threefish Block Cipher
6.3 Security Proofs
6.4 Security Above the Birthday Bound
6.5 Tunable Security Parameter
7 Implementing Skein
7.1 Software Implementations
7.1.1 Threefish
7.1.2 UBI
7.1.3 Skein
7.2 Hardware Implementations
7.2.1 Threefish
7.2.2 UBI
7.2.3 Skein
8 Skein Design
8.1 Design Philosophy
8.2 General Design Decisions
8.3 Threefish Design Decisions
8.4 UBI Design
8.5 Optional Argument System
9 Preliminary Cryptanalysis of Threefish and Skein
9.3 Related-Key Attacks for the Threefish Block Cipher
9.3.1 Empirical Observations for Threefish-256
9.3.2 Empirical Observations for Threefish-512 and Threefish-1024
9.3.3 Key Recovery Attacks
9.3.4 Pushing the Attack Further: Prepending Four Additional Rounds
9.4 An Attack on the Threefish Block Cipher that Doesn’t Quite Work
9.5 Third-Party Cryptanalysis
9.5.1 Differential Cryptanalysis
9.5.2 Rotational Cryptanalysis
9.6 Empirical Observations for Threefish with Random Rotation Constants
9.7 Cryptanalysis Summary
10 Skein Website
11 Legal Disclaimer
12 Acknowledgements
13 About the Authors
B.1 Skein-256-128
B.2 Skein-256-160
B.3 Skein-256-224
B.4 Skein-256-256
B.5 Skein-512-128
B.6 Skein-512-160
B.7 Skein-512-224
B.8 Skein-512-256
B.9 Skein-512-384
B.10 Skein-512-512
B.11 Skein-1024-384
B.12 Skein-1024-512
B.13 Skein-1024-1024
C.1 Skein-256-256
C.2 Skein-512-512
C.3 Skein-1024-1024
Appendix D NIST SHA-3 Round 2 Tweak: Rotation Constants
D.1 Deprecated Skein Rotation Constants
D.2 Empirical Cryptanalysis on the Deprecated Rotation Constants
D.3 New Empirical Cryptanalysis on the Deprecated Rotation Constants
Appendix E Empirical data for tweaking the key schedule con-
E.1 Defining the requirements for the new constant
E.2 Searching for the new constant
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 182|Likes:
Published by idea.angel

More info:

Published by: idea.angel on Jan 14, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 11 are not shown in this preview.
You're Reading a Free Preview
Pages 15 to 27 are not shown in this preview.
You're Reading a Free Preview
Pages 31 to 100 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->