[tahoe-dev] about pycryptopp unit test
Jack Lloyd
lloyd at randombit.net
Thu May 20 08:23:48 PDT 2010
On Thu, May 20, 2010 at 11:11:34PM +0800, yu xue wrote:
> Hello, everyone:
> I am a student who is lucky to be choosed as one of this year's gsoc
> students. My name is Yu Xue. Next week the gsoc will start. My gsoc project
> is "100 year cryptography". This project's main purpose is to implement some
> combiners of cryptographic algorithms. The first part is combiner of
> ciphers. In this phase, I will write the documents and API, write test
> harness including unit tests, tests vectors etc, and implement the combiner
> of block cipher based on the test cases which is mainly comber of AES using
> CTR mode and XSalsa20. The second part is combiner of hash function---Comb4P
> which has three round feistel and the round function is composed of xoring
> of H0 and H1 with the help of round index i. The above two parts is the main
Yay!
Some things that need to be resolved:
- Which hash functions will we combine? SHA-256 seems like an obvious
candidate for one half, since it is relatively standard and thought
to be secure at the moment, and is relatively efficient on 32-bit
machines. But what of the other half? One of the SHA-3 candidates
seems plausible, but which one? Ideally, we would choose precisely
the function that will be eventually become SHA-3, but with 14
round 2 candidates the odds of this are not terribly high.
We could also instead combine SHA-256 with another hash already in
Crypto++, for instance RIPEMD-160, Whirlpool, or SHA-512.
- Will Comb4P be implemented in Python? In C++? Should we try to get
Wei Dai to adopt Comb4P into the next version of Crypto++?
-Jack
More information about the tahoe-dev
mailing list