FACTOID # 21: 15% of Army recruits from South Dakota are Native American, which is roughly the same percentage for female Army recruits in the state.

 Home Encyclopedia Statistics States A-Z Flags Maps FAQ About

 WHAT'S NEW

SEARCH ALL

Search encyclopedia, statistics and forums:

(* = Graphable)

Encyclopedia > Salsa20

Internally, the cipher uses bitwise addition (exclusive OR), 32-bit addition mod 232, and constant-distance rotation operations on an internal state of 16 32-bit words. This choice of operations avoids the possibility of timing attacks in software implementations. Exclusive disjunction (usual symbol xor) is a logical operator that results in true if one of the operands (not both) is true. ... Modular arithmetic (sometimes called modulo arithmetic, or clock arithmetic because of its use in the 24-hour clock system) is a system of arithmetic for integers, where numbers wrap around after they reach a certain value â€” the modulus. ... In cryptography, a timing attack is a form of side channel attack where the attacker tries to break a cryptosystem by analyzing the time taken to execute cryptographic algorithms. ...

Salsa20 performs 20 rounds of mixing on its input; however, reduced round variants Salsa20/8 and Salsa20/12 using 8 and 12 rounds respectively have also been introduced. These variants were introduced to complement the original Salsa20, not to replace it, and perform even better in the eSTREAM benchmarks than the already competitive Salsa20.

As of 2006, no cryptanalytic attacks against Salsa20, Salsa20/12, or Salsa20/8 have been recognised. In 2005, Paul Crowley reported a 2165-operation attack on Salsa20/5 using truncated differential cryptanalysis [1] and won Bernstein's US\$1000 prize for "most interesting Salsa20 cryptanalysis". In 2006, Fischer, Meier, Berbain, Biasse, and Robshaw reported a 2177-operation attack on Salsa20/6.[2] 2006 is a common year starting on Sunday of the Gregorian calendar. ... In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. ...

Salsa20 has been selected as a Phase 3 design for Profile 1 (software) by the eSTREAM project, receiving the highest weighted voting score of any Profile 1 algorithm at the end of Phase 2 [2]. Salsa20 had previously been selected as Phase 2 Focus design for Profile 1 (software) and as a Phase 2 design for Profile 2 (hardware) by the eSTREAM project [3], but was not advanced to Phase 3 for Profile 2 because eSTREAM felt that it was probably not a good candidate for extremely resource constrained hardware environments [4].

1. ^ Paul Crowley, Truncated differential cryptanalysis of five rounds of Salsa20
2. ^ Simon Fischer, Willi Meier, Côme Berbain, Jean-Francois Biasse, Matt Robshaw, Non-Randomness in eSTREAM Candidates Salsa20 and TSC-4, Indocrypt 2006

Matthew J.B. Matt Robshaw is a cryptographer, currently a lecturer at Royal Holloway, University of London. ... Indocrypt (also INDOCRYPT) is an annual international cryptography conference held each December since 2000 in India. ...

Share your thoughts, questions and commentary here