Recall that the sponge construction describes how to turn a public random permutation into a cryptographic hash function. Once the data to be hashed has been padded, the next step is to absorb the data r bits at a time. blk = <0> while not done:     xor the next r bits of data into the first r bits of blk     blk = p(blk) As a convenient (but not secure because it's too small) public random permutation, lets use the AES S-box for p. What is blk after absorbing each of the following when r=4 bits. Give your answer as exactly either 2 hexadecimal digits or 8 binary digits with no spaces (eg, 0A or 00001010). Note that the data is already padded and you should restart at blk=<0> each for each computation Data: 1001  Resulting blk:____ Data 10011001  Resulting blk:_____ Data 100110011001  Resulting blk:____

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Recall that the sponge construction describes how to turn a public random permutation into a cryptographic hash function. Once the data to be hashed has been padded, the next step is to absorb the data r bits at a time.

blk = <0>
while not done:
    xor the next r bits of data into the first r bits of blk
    blk = p(blk)

As a convenient (but not secure because it's too small) public random permutation, lets use the AES S-box for p. What is blk after absorbing each of the following when r=4 bits. Give your answer as exactly either 2 hexadecimal digits or 8 binary digits with no spaces (eg, 0A or 00001010). Note that the data is already padded and you should restart at blk=<0> each for each computation

Data: 1001  Resulting blk:____

Data 10011001  Resulting blk:_____

Data 100110011001  Resulting blk:____

 

 

 

Table 4.3 AES S-Box: Substitution values in hexadecimal notation for input byte (xy)
1
4
8
А В
0| 63
7B F2 6B 6F
36 3F F7 CC 34
E
に82K出%m乃明为的从呢吓s
刀引配尔%妍路D唱卧姐阳D3明
合芝8幻的9况E印姐努么即a%高
0Eg九郎》以nnさm叭的相%巴品
配的沙不引助H配趴正的即你
に2日%8肥以以正昭心科及幻幻力
5822出国网函幻旺的%助多正为
52队好配过4088u明4
7E8%2男5巧口船犯心的阳外8
お#%以咀卧肠旺
88%8的函
引4见护29如吧48即
3仍%G从即田尔配gu0伍%=m
27883R8m和B年以打巧时%8
に犯即口路叭即心ga28%狂昭M
Sさ88856s品卧队刀引配
Transcribed Image Text:Table 4.3 AES S-Box: Substitution values in hexadecimal notation for input byte (xy) 1 4 8 А В 0| 63 7B F2 6B 6F 36 3F F7 CC 34 E に82K出%m乃明为的从呢吓s 刀引配尔%妍路D唱卧姐阳D3明 合芝8幻的9况E印姐努么即a%高 0Eg九郎》以nnさm叭的相%巴品 配的沙不引助H配趴正的即你 に2日%8肥以以正昭心科及幻幻力 5822出国网函幻旺的%助多正为 52队好配过4088u明4 7E8%2男5巧口船犯心的阳外8 お#%以咀卧肠旺 88%8的函 引4见护29如吧48即 3仍%G从即田尔配gu0伍%=m 27883R8m和B年以打巧时%8 に犯即口路叭即心ga28%狂昭M Sさ88856s品卧队刀引配
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY