Tag Archives: assembly

Keccak Permutation Function

Introduction Permutation functions are incredibly useful, and Keccak which is used to implement the SHA-3 standard is a like a swiss army knife of cryptographic primitives. Designed by Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche, Keccak can … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , , | Leave a comment

Chaskey Message Authentication Code

Introduction Chaskey is a lightweight MAC algorithm optimised for 32-bit micro-controllers designed by Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel and Ingrid Verbauwhede. It is based on a 128-bit block cipher, the Chaskey cipher, which uses … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , | 2 Comments

Rabbit Stream Cipher

Introduction Rabbit is a stream cipher designed in 2003 by Martin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen and Ove Scavenius. It was published in 2005 and selected as a software cipher for the eSTREAM portfolio in 2008. It’s designed … Continue reading

Posted in assembly, cryptography, encryption, security | Tagged , , , , | 1 Comment

SHA-3 Cryptographic hash

Introduction Keccak is a permutation function designed by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. It was selected by NIST to become the SHA-3 standard and is a complement to SHA-2 rather than a replacement. Currently, SHA-2 … Continue reading

Posted in assembly, cryptography, programming, security | Tagged , , , , , , , , , | 2 Comments

Serpent-256 Block cipher

Introduction Serpent is a symmetric block cipher designed by Eli Biham, Ross Anderson and Lars Knudsen published in 1998. It was runner up to Rijndael which became the AES standard. Like other AES finalists, it uses 128-bit block size, key … Continue reading

Posted in assembly, cryptography, encryption, programming | Tagged , , , , , | 8 Comments

Twofish-256 Block cipher

Introduction Twofish is a symmetric block cipher published in 1998. It was designed and analyzed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. It was one of the 5 AES finalists but lost out … Continue reading

Posted in assembly, cryptography, programming, security | Tagged , , , , , | 1 Comment

RC6 Block cipher

RC6 is a symmetric block cipher designed by Ron Rivest, Matthew Robshaw, Ray Sidney and Yiqun Lisa Yin published in 1998. It was one of the 5 finalists considered for Advanced Encryption Standard. Although I haven’t personally seen it used … Continue reading

Posted in assembly, cryptography, programming, security | Tagged , , , , | 1 Comment

DES Block cipher

Introduction DES was originally designed and written by a team of computer scientists working at IBM along with the NSA and published by NIST in January 1977. Although obsolete due to AES, DES continues to be used for various reasons … Continue reading

Posted in assembly, cryptography, encryption, security | Tagged , , , | Leave a comment

AES-256 (Rijndael) Block cipher

Introduction Rijndael is a symmetric block cipher designed by Joan Daemen and Vincent Rijmen. It was published in 1999 and selected by NIST to replace DES in 2001. It processes 128-bit blocks of data, uses key sizes of 128/192/256-bits with … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , , , , , | 6 Comments

TEA block cipher

Introduction Tiny Encryption Algorithm was published in November 1994 by Cambridge computer scientists, David John Wheeler and Roger Needham TEA is not subject to any patents. This along with its simplicity made it attractive to various developers, particularly in the … Continue reading

Posted in assembly, cryptography, encryption, programming, security | Tagged , , | Leave a comment