Recall that the sponge construction describes how to turn a public random permutation into a cryptographic hash function. Once the data to be hashed has been absorbed, the next step is to "squeeze" the hash result out r bits at a time. blk = result of absorbing phase while not done: output the first r bits of blk (or less if less required) blk = p(blk) %3D As a convenient (but not secure because it's too small) public random permutation, lets use the AES S-box for p. What is the hash output if the result of the absorbing phase is blk = 3A and r=4, and a 10 bit hash output is required? Give your answer as exactly 10 binary digits with no spaces (eg, 0010100011).

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
Table 4.3 AES S-Box: Substitution values in hexadecimal notation for input byte (xy)
1
4
8
А В
0| 63
7B F2 6B 6F
36 3F F7 CC 34
E
に82K出%m乃明为的从呢吓s
刀引配尔%妍路D唱卧姐阳D3明
合芝8幻的9况E印姐努么即a%高
0Eg九郎》以nnさm叭的相%巴品
配的沙不引助H配趴正的即你
に2日%8肥以以正昭心科及幻幻力
5822出国网函幻旺的%助多正为
52队好配过4088u明4
7E8%2男5巧口船犯心的阳外8
お#%以咀卧肠旺
88%8的函
引4见护29如吧48即
3仍%G从即田尔配gu0伍%=m
27883R8m和B年以打巧时%8
に犯即口路叭即心ga28%狂昭M
Sさ88856s品卧队刀引配
Transcribed Image Text:Table 4.3 AES S-Box: Substitution values in hexadecimal notation for input byte (xy) 1 4 8 А В 0| 63 7B F2 6B 6F 36 3F F7 CC 34 E に82K出%m乃明为的从呢吓s 刀引配尔%妍路D唱卧姐阳D3明 合芝8幻的9况E印姐努么即a%高 0Eg九郎》以nnさm叭的相%巴品 配的沙不引助H配趴正的即你 に2日%8肥以以正昭心科及幻幻力 5822出国网函幻旺的%助多正为 52队好配过4088u明4 7E8%2男5巧口船犯心的阳外8 お#%以咀卧肠旺 88%8的函 引4见护29如吧48即 3仍%G从即田尔配gu0伍%=m 27883R8m和B年以打巧时%8 に犯即口路叭即心ga28%狂昭M Sさ88856s品卧队刀引配
Recall that the sponge construction describes how to turn a public random permutation into a
cryptographic hash function. Once the data to be hashed has been absorbed, the next step is to
"squeeze" the hash result outr bits at a time.
blk = result of absorbing phase
while not done:
output the first r bits of blk (or less if less required)
blk = p(blk)
As a convenient (but not secure because it's too small) public random permutation, lets use the
AES S-box for p. What is the hash output if the result of the absorbing phase is blk = 3A and r=4,
and a 10 bit hash output is required? Give your answer as exactly 10 binary digits with no spaces
(eg, 0010100011).
Transcribed Image Text:Recall that the sponge construction describes how to turn a public random permutation into a cryptographic hash function. Once the data to be hashed has been absorbed, the next step is to "squeeze" the hash result outr bits at a time. blk = result of absorbing phase while not done: output the first r bits of blk (or less if less required) blk = p(blk) As a convenient (but not secure because it's too small) public random permutation, lets use the AES S-box for p. What is the hash output if the result of the absorbing phase is blk = 3A and r=4, and a 10 bit hash output is required? Give your answer as exactly 10 binary digits with no spaces (eg, 0010100011).
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY