TWISTERπ – a framework for secure and fast hash functions
Source: International Journal of Applied Cryptography, Volume 2, Number 1, 1 July 2010 , pp. 68-81(14)
Publisher: Inderscience Publishers
Abstract:In this paper we present TWISTERπ, a framework for hash functions. It is an improved version of TWISTER, a candidate of the NIST SHA‐3 hash function competition. TWISTERπ is built upon the ideas of wide pipe and sponge functions. The core of this framework is a – very easy to analyse – Twister‐Round providing both extremely fast diffusion as well as collision‐freeness for one internal Twister‐Round. The total security level is claimed to be not below 2n/2 for collision attacks and 2n for (2nd) pre‐image attacks. TWISTERπ instantiations are secure against all known generic attacks. We also propose two instances TWISTERπ‐n for hash output sizes n = 256 and n = 512. These instantiations are highly optimised for 64‐bit architectures and run very fast in hardware and software, e.g TWISTERπ‐256 is faster than SHA2‐256 on 64‐bit platforms and TWISTERπ‐512 is faster than SHA2‐512 on 32‐bit platforms. Furthermore, TWISTERπ scales very well on low‐end platforms.
Keywords: Applied and Computational Mathematics; COMPUTING AND MATHEMATICS; Communications and Mobile Technology; Computing Science, Applications and Software; Information Systems and Technology; Internet and Web Services; RISK, SAFETY AND EMERGENCY MANAGEMENT; Security and Emergency Management
Document Type: Research Article
Affiliations: 1: Chair of Media Security, Faculty of Media, Bauhaus-University Weimar, Weimar, Germany. 2: Sirrix AG, Bochum, Germany. 3: Chair of Media Security, Faculty of Media, Bauhaus-University Weimar, Weimar, Germany
Publication date: July 1, 2010
- Information security is important to the rapid growth of the Internet and advances of computer systems. However, existing journals on information security mainly focus on either theory or specific areas of information and computer security.
The International Journal of Applied Cryptography aims to introduce new ground between these two areas. It proposes and fosters discussion on cryptographic algorithms and protocols that are directly applicable.
- Information for Authors
- Submit a Paper
- Subscribe to this Title
- Terms & Conditions
- ingentaconnect is not responsible for the content or availability of external websites