NIST hash function competition

Fugue (hash function)

Fugue is a cryptographic hash function submitted by IBM to the NIST hash function competition. It was designed by Shai Halevi, William E. Hall, and Charanjit S. Jutla. Fugue takes an arbitrary-length message and compresses it down to a fixed bit-length (either 224, 256, 384 or 512 bits). The hash functions for the different output lengths are called Fugue-224, Fugue-256, Fugue-384 and Fugue-512. The authors also describe a parametrized version of Fugue. A weak version of Fugue-256 is also described using this parameterized version. The selling point of Fugue is the authors' claimed proof that a wide range of current attack strategies based on differential cryptanalysis cannot be efficient against Fugue. It is also claimed to be competitive with the NIST hash function SHA-256 in both software and hardware efficiency, achieving up to 36.2 cycles per byte on an Intel Family 6 Model 15 Xeon 5150, and up to 25 cycles per byte on an Intel Core 2 processor T7700. On 45 nm Core2 processors, e.g. T9400, Fugue-256 runs at 16 cycles per byte using SSE4.1 instructions. On the newer Westmere architectures (32 nm), e.g. Core i5, Fugue-256 runs at 14 cycles/byte. Fugue's design starts from the hash function , and like Grindahl uses the S-box from AES, but it replaces the 4×4 column mixing matrix with a 16×16 "super-mix" operation which greatly improves diffusion. The "super-mix" operation is, however, only slightly more computationally expensive to implement than the AES mixing strategy. (Wikipedia).

Video thumbnail

Cryptography (part 3 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

(New Version Available) Inverse Functions

New Version: https://youtu.be/q6y0ToEhT1E Define an inverse function. Determine if a function as an inverse function. Determine inverse functions. http://mathispower4u.wordpress.com/

From playlist Exponential and Logarithmic Expressions and Equations

Video thumbnail

Cryptographic Hash Functions: Part 1

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Inverse Functions

A graphic and algebraic approach to finding inverse functions. Definition of the Inverse of a Function Let f and g be two functions such that f(g(x)) = x for every x in the domain of g and g(f(x)) = x for all x in the domain of f. Check out http://www.ProfRobBob.com, there you will find

From playlist PreCalculus

Video thumbnail

Inverse Functions (part one)

An introduction to inverse functions. I talk about what an inverse function is, the relationship between domain and range, and the composition of two inverse functions. Stay tuned for part two! Facebook: https://www.facebook.com/braingainzofficial Instagram: https://www.instagram.com/b

From playlist Precalculus

Video thumbnail

Quantum Computing - Spooky Action at a Distance - Extra History - #4

What happens when we can't link physical cause and effect between two actions? Well, quantum bits (or qubits) do this all the time. Let's look into how quantum entanglement can be used in computing. Credit to Alisa Bishop for her art on this series: http://www.alisabishop.com/ A tremendou

From playlist Extra History : Quantum Computing

Video thumbnail

Lecture 13. Fugue: Bach, Bizet and Bernstein

Listening to Music (MUSI 112) In this lecture, Professor Wright briefly explores the manifestations of the fugue form in poetry, painting, and other disciplines, and then gives a detailed explanation of how fugues are put together in music. Though he uses excerpts by composers as disparat

From playlist Listening to Music with Craig Wright

Video thumbnail

Lecture 14. Ostinato Form in the Music of Purcell, Pachelbel, Elton John and Vitamin C

Listening to Music (MUSI 112) This lecture begins with a review of all the musical forms previously discussed in class: sonata-allegro, rondo, theme and variations, and fugue. Professor Wright then moves on to discuss the final form that will be taught before the students' next exam: osti

From playlist Listening to Music with Craig Wright

Video thumbnail

Cryptographic Hash Functions: Part 2

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Eating Poison Fish | National Geographic

The puffer fish is a very expensive dish to eat...but watch out, it can kill you. ➡ Subscribe: http://bit.ly/NatGeoSubscribe #NationalGeographic #PufferFish #Fugu About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Th

From playlist Oceans | National Geographic

Video thumbnail

Live CEOing Ep 107: Language Design in Wolfram Language

Watch Stephen Wolfram and teams of developers in a live, working, language design meeting. This episode is about Language Design in the Wolfram Language.

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Lec 27 | MIT 7.012 Introduction to Biology, Fall 2004

Nervous System 2 (Prof. Eric Lander) View the complete course: http://ocw.mit.edu/7-012F04 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 7.012 Introduction to Biology, Fall 2004

Video thumbnail

Bach: Toccata and Fugue in D minor, BWV 565

Posibly my favourite Bach composition. The Toccata and Fugue in D minor, BWV 565, is a piece of organ music composed by Johann Sebastian Bach sometime between 1703 and 1707. It is one of the most famous works in the organ repertoire, and has been used in a variety of popular media ranging

From playlist Brilliant Music

Video thumbnail

Lecture 23: Hash Tables - Richard Buckland UNSW Computing2

Lecture 23 of comp1927 data structures and algorithms aka computing2. Searching searching searching... Searching leads us to hash tables and maybe even more. What dark horrors lurk ahead...??? Richard Buckland UNSW Computing recorded in 2009.

From playlist CS2: Data Structures and Algorithms - Richard Buckland

Video thumbnail

Lecture 16. Baroque Music: The Vocal Music of Johann Sebastian Bach

Listening to Music (MUSI 112) In this lecture, Professor Wright discusses the Baroque period through a detailed look at the life and music of Johann Sebastian Bach. He first takes the students through the basics of Bach's life, showing slides of the towns and buildings in which Bach and h

From playlist Listening to Music with Craig Wright

Video thumbnail

Unlocking New Capabilities for the Web

To close the capability gap between the web and native to provide a solid foundation for modern applications delivered on the web, the web needs open. Learn how some of these new capabilities work, what's on our road map, and how we're designing them to work in a way that respect user. EV

From playlist Web Development

Video thumbnail

Lesson: Inverse Functions

Define an inverse function. Determine if a function as an inverse function. Determine inverse functions.

From playlist Determining Inverse Functions

Related pages

NIST hash function competition | S-box | Cryptographic hash function | Differential cryptanalysis | Advanced Encryption Standard