Skip to main content

Design and Implementation of Twister Algorithm Based on FPGA

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 224))

Included in the following conference series:

  • 1794 Accesses

Abstract

Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise the need for alternatives. The Twister hash function is developed by a team by Ewan Fleischmann in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the National Institute of Standards and Technology. In this paper, introduces the logic structure of Twister algorithm. Using the structure advantage of FPGA hardware devices and give the FPGA Design and Implementation project of Twister algorithm. Final the timing simulation of some modules were given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dobbertin, H.: Cryptanalysis of MD4. Journal of Cryptology 11(4), 253–271 (1998)

    Article  MATH  Google Scholar 

  2. Kim, J., Biryukov, A., Preneel, B., Lee, S.: On the Security of Encryption Modes of MD4,MD5 and HAVAL. Cryptology ePrint Archive, report 2005/327

    Google Scholar 

  3. Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199

    Google Scholar 

  4. Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Stevens, M.: Fast Collision Attack on MD5. Cryptology ePrint Archive, report 2006/104

    Google Scholar 

  7. Klima, V.: Finding MD5 Collisions-a Toy For a Notebook, Cryptology ePrint Archive, Report 2005/075

    Google Scholar 

  8. Klima, V.: Finding MD5 Collisions on a Notebook PC Using Multi-message Modications, Cryptology ePrint Archive, Report 2005/102

    Google Scholar 

  9. Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute, Cryptology ePrint Archive, Report 2006/105

    Google Scholar 

  10. Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56–71. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Wang, X., Yin, Y.L., Yu, H.: Collision Search Attacks on SHA1, research summary (2005)

    Google Scholar 

  12. Hawkes, P., Paddon, M., Rose, G.: On Corrective Patterns for the SHA-2 Family, Cryptology ePrint Archive, Report 2004/207

    Google Scholar 

  13. Fleischmann, E., Forler, C., Gorski, M.: The Twister Hash Function Family, October 28 (2008), http://www.twister-hash.com

  14. Yi, X., Cheng, S.X., You, X.H., Lam, K.Y.: A Method for Obtaining Cryptographically Strong 8x8 S-boxes. In: IEEE Global Elecommunications Conference, GLOBECOM 1997, vol. 2, pp. 689–693 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lei, Z. (2011). Design and Implementation of Twister Algorithm Based on FPGA. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_83

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23214-5_83

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23213-8

  • Online ISBN: 978-3-642-23214-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics