Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Add HC-256 stream cipher (GH #680) | Jeffrey Walton | 2018-07-05 | 2 | -0/+2331 |
| | |||||
* | Add additional HC-128 test vectors (GH #679) | Jeffrey Walton | 2018-07-05 | 1 | -0/+16 |
| | |||||
* | Add HC-128 stream cipher (GH #679) | Jeffrey Walton | 2018-07-05 | 2 | -2/+635 |
| | |||||
* | Update comments | Jeffrey Walton | 2018-07-04 | 1 | -0/+6 |
| | |||||
* | Add additional Rabbit test vectors (GH #678) | Jeffrey Walton | 2018-07-04 | 1 | -0/+1905 |
| | |||||
* | Add Rabbit stream cipher (GH #678) | Jeffrey Walton | 2018-07-04 | 2 | -0/+70 |
| | |||||
* | Add additional SIMECK tests (GH #675) | Jeffrey Walton | 2018-06-30 | 1 | -0/+85 |
| | |||||
* | Add additional SIMECK tests (GH #675) | Jeffrey Walton | 2018-06-30 | 1 | -0/+85 |
| | |||||
* | Add Simeck lightweight block cipher (GH #675) | Jeffrey Walton | 2018-06-30 | 2 | -0/+148 |
| | | | Add Simeck lightweight block cipher (GH #675) | ||||
* | Fix copy/paste error | Jeffrey Walton | 2018-06-25 | 1 | -14/+14 |
| | |||||
* | Add HIGHT lightweight block cipher (GH #672) | Jeffrey Walton | 2018-06-24 | 2 | -1/+109 |
| | |||||
* | Add additional LEA test vectors (GH #669) | Jeffrey Walton | 2018-06-23 | 1 | -0/+249 |
| | |||||
* | Add additional LEA test vectors (GH #669) | Jeffrey Walton | 2018-06-23 | 1 | -3/+251 |
| | |||||
* | Add additional CHAM test vectors (PR #670) | Jeffrey Walton | 2018-06-19 | 1 | -0/+256 |
| | | | | This is in preparation for SSE and large block processing. CTR mode is used because AdvancedProcessBlocks128_4x1_SSE | ||||
* | Add CHAM lightweight block cipher (PR #670) | Jeffrey Walton | 2018-06-17 | 2 | -0/+216 |
| | | | Add CHAM lightweight block cipher | ||||
* | Add LEA lightweight block cipher (GH #669) | Jeffrey Walton | 2018-06-17 | 2 | -0/+217 |
| | |||||
* | Add KeyDerivationFunction interface (GH #610, PR #611) | Jeffrey Walton | 2018-03-29 | 2 | -25/+24 |
| | |||||
* | Updated source comment | Jeffrey Walton | 2018-02-20 | 2 | -10/+10 |
| | |||||
* | Add Simon and Speck test vectors to All group (GH #585) | Jeffrey Walton | 2018-02-19 | 1 | -0/+2 |
| | |||||
* | Use random IV's for Simon and Speck test vectors | Jeffrey Walton | 2018-02-18 | 2 | -780/+780 |
| | |||||
* | Re-add Simon and Speck test vectors (GH #585) | Jeffrey Walton | 2018-02-18 | 2 | -0/+1770 |
| | | | | Of the 200+ test vectors only 10 are semi-authentic. The ten are from the Simon and Speck paper but they had permutations applied to them so they worked with the algorithms described in the paper. The remaining 200 or so were generated with Crypto++ using straight C++ code. The library generated the test vectors because we don't have a reference implementation | ||||
* | Finish removing Simon and Speck (GH #585) | Jeffrey Walton | 2018-02-15 | 1 | -2/+0 |
| | |||||
* | Remove Simon and Speck ciphers (GH #585) | Jeffrey Walton | 2018-02-14 | 2 | -2175/+0 |
| | | | | | | We recently learned our Simon and Speck implementation was wrong. The removal will stop harm until we can loop back and fix the issue. The issue is, the paper, the test vectors and the ref-impl do not align. Each produces slightly different result. We followed the test vectors but they turned out to be wrong for the ciphers. We have one kernel test vector but we don't have a working implementation to observe it to fix our implementation. Ugh... | ||||
* | Add Speck-128/CTR test vectors | Jeffrey Walton | 2018-02-12 | 1 | -0/+249 |
| | |||||
* | Add Simon-128/CTR test vectors | Jeffrey Walton | 2018-02-12 | 1 | -0/+249 |
| | |||||
* | Convert Kalyna from variable block size (GH #535) | Jeffrey Walton | 2018-01-18 | 1 | -20/+10 |
| | |||||
* | Fix Simon-64 and Speck-64 CTR mode | Jeffrey Walton | 2017-12-07 | 2 | -24/+510 |
| | | | | | This fixes CTR mode for IA-32. We were only incrementing half the counters. Added additional test vectors | ||||
* | Add additional Simon test vectors | Jeffrey Walton | 2017-12-02 | 1 | -0/+188 |
| | |||||
* | Add additional Speck test vectors | Jeffrey Walton | 2017-12-02 | 1 | -0/+204 |
| | |||||
* | Add SPECK-64 and SPECK-128 large block tests | Jeffrey Walton | 2017-12-01 | 1 | -0/+102 |
| | | | | The tests were generated using Crypto++ and the straight C++ implementation. It should allow us to test the SSE and NEON impelmentations and multiple blocks | ||||
* | Add SIMON-64 and SIMON-128 large block tests | Jeffrey Walton | 2017-12-01 | 2 | -1/+101 |
| | | | | The tests were generated using Crypto++ and the straight C++ implementation. It should allow us to test the SSE and NEON impelmentations and multiple blocks | ||||
* | List Key after Comments in Simon test vectors | Jeffrey Walton | 2017-11-28 | 1 | -54/+54 |
| | |||||
* | Add additional Simon-64 test vectors | Jeffrey Walton | 2017-11-28 | 1 | -1/+126 |
| | |||||
* | Add additional Simon-128 test vectors | Jeffrey Walton | 2017-11-28 | 1 | -0/+189 |
| | |||||
* | Add additional SM3 test vectors (GH #541) | Jeffrey Walton | 2017-11-24 | 1 | -0/+165 |
| | |||||
* | Add additional SM3 test vectors (GH #541) | Jeffrey Walton | 2017-11-24 | 1 | -21/+61 |
| | |||||
* | Add additional SM3 test vectors (GH #541) | Jeffrey Walton | 2017-11-24 | 1 | -0/+134 |
| | |||||
* | Add additional SM3 test vectors | Jeffrey Walton | 2017-11-24 | 1 | -10/+170 |
| | | | | Cleanup SM3 whitespace | ||||
* | Update documentation | Jeffrey Walton | 2017-11-24 | 1 | -2/+2 |
| | |||||
* | Add SM3 hash function (GH #541) | Jeffrey Walton | 2017-11-23 | 2 | -0/+20 |
| | |||||
* | Add additional SM4 test vectors (GH #540) | Jeffrey Walton | 2017-11-23 | 1 | -0/+70 |
| | | | | The additional ECB mode vectors were generated with Botan. We still need some vectors for SM4/CBC | ||||
* | Add SM4 block ciphers (GH #540) | Jeffrey Walton | 2017-11-23 | 2 | -0/+164 |
| | |||||
* | Add additional test vectors (GH #538, #539) | Jeffrey Walton | 2017-11-22 | 1 | -25/+87 |
| | | | | These were generated by Crypto++ using the C/C++ implementation, which operates on 1 block at a time. They are consumed by the SSSE3 implementation, which operates on 4 blocks at a time. Its not ideal, but it will have to do. | ||||
* | Add SIMON-64 and SIMON-128 lightweight block ciphers (GH #539) | Jeffrey Walton | 2017-11-21 | 1 | -0/+41 |
| | |||||
* | Remove unneeded include | Jeffrey Walton | 2017-11-21 | 1 | -2/+5 |
| | |||||
* | Add additional SPECK test vectors (GH #538) | Jeffrey Walton | 2017-11-20 | 1 | -0/+140 |
| | | | | These were generated by modifying the reference implementation | ||||
* | Add SPECK-64 and SPECK-128 lightweight block ciphers (GH #538) | Jeffrey Walton | 2017-11-20 | 3 | -1/+216 |
| | |||||
* | Remove variable block size for Threefish (GH #535) | Jeffrey Walton | 2017-11-17 | 1 | -25/+24 |
| | |||||
* | Add additional Threefish test vectors | Jeffrey Walton | 2017-05-15 | 1 | -0/+77 |
| | | | | The test vectors came from NIST submission archive (NIST_CD_102610), skein_golden_kat_short_internals.txt | ||||
* | Add Threefish block cipher (Issue 422) | Jeffrey Walton | 2017-05-14 | 2 | -0/+42 |
| |