Skip to main content

Questions tagged [compression-function]

A compression function takes two fixed-size inputs: a chaining value and a message and returns a fixed-size value.

2 votes
2 answers
137 views

I compared the various key schedules of AES, SHA2, BLAKE, Threefish and the approaches are very different. BLAKE and Threefish have the most basic key schedules (mere permutations/shuffles of words ...
user7383523's user avatar
1 vote
0 answers
81 views

If they are invertible, why are they used? Is it just for bit diffusion and to increase the amount of correlation between the bits, and thus increase "confusion" in the internal state?
Ömer Enes Özmen's user avatar
2 votes
2 answers
205 views

I'm currently focusing on the implementation of Kyber (ML-KEM). I noticed that the avx2 version of the compress operation seems to use a fast division algorithm. ref version here: https://github.com/...
Tall's user avatar
  • 33
2 votes
2 answers
331 views

I was reading CRYSTALS-Kyber design. They have used compress_q(x,d) to scale an element of $\mathbb{Z}_q$ to $[ 0,1,...,2^d-1 ]$. The definitions of ...
ABCD's user avatar
  • 95
1 vote
0 answers
133 views

I know that DES has 56 independent key bits, and that 3DES has 168 independent key bits by using 3 separate 56-bit DES keys. 3DES also has a block size of 64 bits. If I use 3DES as the underlying ...
mjg4's user avatar
  • 11
0 votes
0 answers
69 views

I'm designing a hash function which uses a double-tree construction and a compression function $c(s,A,B,C,a)$ ($s$ and $a$ may be omitted when there's only one of them) where $s$ is a set of three ...
Pierre Abbat's user avatar
2 votes
1 answer
188 views

Rumba20 is a compression function that maps a 192-byte (1536-bit) string to a 64-byte (512-bit) string. It's designed to provide collision resistance by using Salsa20 (or ChaCha20) with the ...
samuel-lucas6's user avatar
0 votes
1 answer
249 views

In this image, It describes the basic idea of an iterative hash function. I am confused as to why the i value is set to be m+t+1 ...
Simon Balfe's user avatar
2 votes
0 answers
99 views

I have seen multiple sources claim that the Merkle-Damgård transform is able to build a collision-resistant Hash-function $H$ for arbitrary-length inputs from a compression function $h : \{0,1\}^n \to ...
Steven's user avatar
  • 131
2 votes
1 answer
107 views

In BLAKE2X paper it is said: BLAKE2X adds a constant overhead of $\lceil\ell/64\rceil$ (resp. $\lceil\ell/32\rceil$ compression function calls compared to the underlying 64-bit (resp. 32-bit) BLAKE2 ...
phantomcraft's user avatar
6 votes
1 answer
472 views

I'm looking for a very fast function $f(m, k) $ that takes a 64-bit integer $m$ and a fixed secret key $k$ of virtually any size (generated by a CSPRNG) and turns them into a 64- or 32-bit integer $ r ...
Nee's user avatar
  • 63
4 votes
2 answers
591 views

This is from Joan Daemen's Doctoral thesis Per page 64 (or PDF page 79) 4.7.1 Our approach Our goal is the design of simple and portable unkeyed and keyed cryptographic hash functions that are ...
user93353's user avatar
  • 2,428
5 votes
2 answers
2k views

What is the differences between data compression as used in e.g. the ZIP protocol and compression as performed in cryptographic hashes? Are there common properties as well, apart from creating a ...
Maarten Bodewes's user avatar
  • 97.1k
1 vote
0 answers
187 views

Let's say I give you the sha256 hash of my password, which I'll call X. Now, the sha256 algorithm is a one-way function, meaning you can give it some input and get an output, but you can't get the ...
Ömer Enes Özmen's user avatar
0 votes
1 answer
388 views

In sha-256, when the words go through the compression function, they get added to the previous hash. In case of the first 64 rounds, they get added to the initial words ($\bmod 2^{32}$ of course). ...
Ömer Enes Özmen's user avatar

15 30 50 per page