Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Too Much Crypto #49

Open
lain-dono opened this issue Aug 11, 2021 · 0 comments
Open

Too Much Crypto #49

lain-dono opened this issue Aug 11, 2021 · 0 comments

Comments

@lain-dono
Copy link

https://eprint.iacr.org/2019/1492.pdf

  • AES: 9 rounds instead of 10 for AES-128, 10 instead of 12 for AES-192, 11 instead of 14
    for AES-256, yielding respectively a 1.1×, 1.2×, and 1.3× speed-up.
  • BLAKE2: 8 rounds instead of 12 for BLAKE2b, 7 rounds instead of 10 for BLAKE2s
    (we’ll call these versions BLAKE2bf and BLAKE2sf), yielding respectively a 1.5× and
    1.4× speed-up.
  • ChaCha: 8 rounds instead of 20 (that is, ChaCha8), yielding a 2.5× speed-up.
  • SHA-3: 10 rounds instead of 24 (we’ll call this version KitTen, inspired by Keccak family
    member KangarooTwelve), yielding a 2.4× speed-up.

Not being an expert in cryptography, I would guess that using modified AES would do more harm than good. In practice, it is easier to make a mistake in an AES implementation than in a ChaCha implementation. However, having a reduced-round ChaCha will allow it to be used instead of AES where performance matters and safety is less important (gamedev-related protocols for example).

At least there are implementations of ChaCha8 and ChaCha12 in the RustCrypto project.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant