Name:- Lochan KC
Course:- ICT4845
Paper # :- 2
Date:- 4/12/2014
Tiger: A Fast New Hash Function
The article is about new type of cryptographic hash function called Tiger developed by Ross Anderson and Eli Biham. It is designed to provide strong and fast hash function. The authors claims that it is as fast as SHA-1 on 32 bit processors and three times faster on 64 bit processors[1].The motivation for the development of tiger came from the fact that collision attacks for Senfru and MD4 was found and also due to poor performance of these functions on 64 bit processors. The author considers the following design criteria for tiger:-it has to be secure with collision and multiplication free, optimized for 64 bit processors and easy replacement for MD4, MD5,SHA and SHA-1[1].
The Tiger hash function produces 192 bit hash value from 512 bit message block. The main operation consists of 4 S-boxes that maps 8 bit to 64 bits, 64 bit addition, subtraction and multiplication and a key schedule for generating 24 rounds of key. To compatible with MD4 and SHA, the output from hash value can be also truncated to 128 and 160 bit. To avoid from intermediate stage attack, it uses large intermediate hash values. It uses three 64 bit registers a, b and c for intermediate hash values. Also each 512 bit blocks is divided into 8 , 64 bits words. It consists of the following stages:- save_abc, pass(a,b,c,5), key_schedule, pass(c,a,b,7),key _schedule, pass(b,c,a,9) and feedforward. Save_abc saves the initial value so that it will be used later on feedforward.Each pass consists of 8 rounds and uses multiplier of 5 ,7 and 9 to redistribute bits between s-box lookups. The round function will then generate new values using the following algorithm. c^=x; ...
... middle of paper ...
...cation and longer Intermediate blocks provides Tiger strong avalanche effect and resistance to shortcut and Dobbertin's differential attacks. But in the recent cryptanalysis of Tiger hash function, the collision attacks were found .
Biblography
1. Anderson, Ross, and Eli Biham. "Tiger: A fast new hash function." In Fast Software Encryption, pp. 89-97. Springer Berlin Heidelberg, 1996.
2. Stallings, William. "3.2 / Secure Hash Functions." Network Security Essentials: Applications and Standards. Boston, MA: Pearson, 2012. 61-70. Print.
3. Florian Mendel and Vincent Rijmen. 2007. Cryptanalysis of the tiger hash function. InProceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security (ASIACRYPT'07), Kaoru Kurosawa (Ed.). Springer-Verlag, Berlin, Heidelberg, 536-550.
This program uses mainly on the concept of cryptology. Cryptology is the study about secret communication between two parties, where there is a presence of a third party known as adversaries, and that party knows nothing about the content of the communication (Rivest, 1990).
The Grand Mosque of Córdoba remains to this day, one of the finest mosques, of that which once was part of the west of the Islamic Umayyad Caliphate. Córdoba was once the capital and seat of the Umayyad Caliph in Spain; then known as Al-Andalus. As such, this city was graced in the days of Islamic Rule by the building of a mosque; a most fundamental part of any Islamic city. If one were to think of Spain now, Islam is of course not the first thought that would usually come to mind. Spain is, after all, a Christian land with a deep Roman Catholic history, and the location of many Christian Pilgrimage destinations. Thus, one would be forgiven for thinking that the Islamic Empires had probably never even reached as far as West Europe. The Grand Mosque of Córdoba tells a different story.
As a young graduate student who never been to Congress, Woodrow Wilson criticized the founding fathers on the separation of powers. Between his first book, Constitutional Government, in 1884, and his second book, Constitutional Government in the United States, in 1908, Wilson shifted his position on important structural features of the constitutional system. The first changed Wilson did in Constitutional Government, was to define the term “constitution” which he ignored in his first book. Second, Wilson focused his study on the presidential power defined by the constitution and third he also realized that external forces are now shaping American politics more than the intentions of the founders.
The Hunger Games was a critically acclaimed movie when it came out; however, some critics would argue that the movie can be sometimes too violent for its intended audience. In this essay I would dissert Brian Bethune’s essay “Dystopia Now” in order to find its weaknesses and compare the movie Battle Royale with his essay.
“‘They score! Henderson has scored for Canada!’” Foster Hewitt wordlessly described” (Pelletier) when Paul Henderson scored the series-winning goal. This allowed Canada to win the 1972 Summit Series, a moment that no one would ever forget since it all happened during the climax of the Cold War. Prior to this, the Soviets had won the previous three Olympic gold metals since Canada could not use its NHL players. Thus, this provided Canada with the chance to play hockey against the USSR using its best players. This raised the question: if Canada were able to send its best players, would it still be enough to beat the Soviets? Everyone in Canada was certain that the Soviets would not win a single game, but little did they know they underestimated the extent of the Soviets abilities. Tied in the last few minutes of game eight, Canada had to score or they would lose the series. However, when Paul Henderson scored the game-winning goal, never before had a single sporting event meant so much to Canadians. Therefore, Paul Henderson’s goal is a defining moment for Canada in the twentieth century becauseit provided Canada with the opportunity to evolve hockey, proved that Canada and our democratic society were superior to the USSR and their communist society, and brought citizens together to unify Canada as a nation.
Has it ever crossed your mind what exactly is that makes people relate to each other? Whether its simple things like food and music or more complex things like language and religion, the feeling of being part of something gives us a sense of satisfaction, and common ground. Humans have an inevitable need to belong. However when those factors that make people interconnect with each other becomes distorted, the results can be catastrophic. In this essay I will discuss the how the genocidal events that took place in the U.S. with the Native Americans, the Belgian Congo, and German South West Africa were carried out and why elements of exploitation, racialization, identity, and inferiority played a role in them.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644-654.
This is a common belief that a white tiger, also known as white Bengal tiger appears once in a generation. Some zoologists opine that an improper blend of the genes of the white tiger’s parents determines the singularity of this predator. Therefore, a white tiger takes birth due to the certain genetic flaw. However, this flaw makes him a versatile predator. It fashions him stronger and more agile than a normal tiger. The white tiger weighs upto 300 kg, and attains a length of about 3 meters. He can outrun the normal tiger even on the soggy land, and can swim quicker in the deep waters. The white tiger is also distinguished for his incredible hearing capacity and curiosity. His farsightedness and stalking are the powerful tools, which make him
The tiger's first line of defense is the rattle at the end of its tail. The Siberian tiger will shake the tail to warn off enemies or communicate to others the threat of danger.
For thousands of years, cryptography and encryption have been used to secure communication. Military communication has been the leader in the use of cryptography and the advancements. From the start of the internet, there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security.
Technology has been and will continue to be an essential part of human life. Information technology is a revolution that has taken the whole world captive. Everyone around the globe is trying either to conform or catch up with the ever changing and improving technologies without having a second thought of its impact on their lives. The internet is the ground-breaking invention of the twenty first century, leading to the mushrooming of the social media and other communication platforms. The best invention that has captured my interest is the instagram. Its effect and how it has positively impacted on the lives of people, especially the youth cannot be underestimated. Instagram is improving the quality life. It has unlocked our creativity, enhanced connection and led to faster access to information. Comparing the past with the present, we can argue that information technology has done more good than harm and even as we progress into the future, we ought to adopt better technology because what we currently have may not be good enough.
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.
Bengal tiger’s are one of the largest and most feared cats in the cat family. An adult tiger can weigh any where from 350 to 550 pounds. The adult males weigh an average of 480 pounds, while the females weigh about 300. Their body lengths are between 6 and 9 feet long! A Bengal tiger hunts primarily deer, wild pigs, water buffalo, birds and other small mammals. When driven from hunger a this tiger will eat almost anything. Crocodiles, lizards, fish, and even humans are eaten by a frustrated Bengal tiger. They eat meat and only meat. Their style of attack is differant from the cheetah’s and the lion’s; who hunt in open habitats. Although it is a heavier predator than that of the lion and cheetah, it averages about 50 deer a year. Bengal tigers need a wide forest-like areas to hunt their prey. They are known to hunt alone, but have been found to hunt in packs. These tigers are semi-nocturnal, bec...
The tiger is known for being a wild and dangerous animal, but also its beauty. In relations to India this could be a reference to the beautiful culture which enriches our experience of India, but also some of the downsides that it has like poverty and unemployment and other sociological factors which paint a grim picture of Indian life.