Category Archives: encryption

SHAKE-128 Stream Cipher

Introduction An Extendable-Output Function (XOF) absorbs input of variable length and generates output of variable length. SHAKE128 and SHAKE256 are two such XOFs designed by the Keccak team and included in the SHA-3 standard. They both use a sponge construction … Continue reading

Posted in cryptography, encryption, programming, security | Tagged , , , , | Leave a comment

SIMECK Block Cipher

Introduction The Simeck Family of Lightweight Block Ciphers written by Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, and Guang Gong was published in 2015. According to the authors, SIMECK combines the good design components of both SIMON and … Continue reading

Posted in arm, assembly, cryptography, encryption, programming, x86 | Tagged , , , , , , , | Leave a comment

BlaBla Stream Cipher

Introduction BlaBla is a 256-bit stream cipher designed by Jean-Philippe Aumasson. It uses the same permutation function as the cryptographic hash algorithm BLAKE2b, that is similar to the permutation function used in the ChaCha stream cipher, hence the name. Frank … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , | Leave a comment

HIGHT Block Cipher

Introduction HIGHT which stands for HIGh security and light weigHT is a 64-bit block cipher with support for 128-bit keys. It was first proposed at the 2006 Cryptographic Hardware and Embedded Systems (CHES) conference held in Japan. HIGHT attracted a … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , | Leave a comment

RoadRunneR Block Cipher

Introduction RoadRunneR is a 64-bit block cipher with support for 80 and 128-bit keys. It was designed by Adnan Baysal and Suhap Sahin and published in 2015. The 80-bit variant uses 10 rounds while the 128-bit uses 12. In this … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , | Leave a comment

CHAM Block Cipher

Introduction CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices was published in December 2017 at the 20th Annual International Conference on Information Security and Cryptology held in South Korea. CHAM consists of three ciphers, CHAM-64/128 for 16-bit architectures, … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , | 1 Comment

Ascon Permutation Function

Introduction Ascon is an Authenticated Encryption Associated Data (AEAD) algorithm submitted to the competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) It was designed by Christoph Dobraunig, Maria Eichlseder, Florian Mendel and Martin Schläffer. Some of the authors mentioned … Continue reading

Posted in cryptography, encryption, programming, security | Tagged , , | Leave a comment

Keccak Permutation Function

Introduction Keccak is a cryptographic permutation function designed by Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche. Keccak can be used to construct a stream cipher, a cryptographic hash function, a Pseudo Random Number Generator (PRNG), Message Authentication … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , , | 1 Comment

Gimli: a cross-platform permutation function

Introduction Gimli, named after the Lord Of The Rings character, is a 384-bit cryptographic permutation function designed by Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , , | 3 Comments

Light Message Authentication Code (LightMAC)

Introduction A Message Authentication Code (MAC) enables two parties using a shared secret key to authenticate messages exchanged between them. Some MACs are constructed from cryptographic hash algorithms like SHA-3 or BLAKE2 while others are constructed from block ciphers. LightMAC … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , , , , , , , , | Leave a comment