From gokaysa@gmail.com Tue Oct 28 14:00:04 2008 Date: Tue, 28 Oct 2008 22:59:56 +0200 From: Gokay Saldamli To: Cody Walker Cc: Megan L. Maguire , koc , Alex Troesch , Jacob Topper , Carl Minden Subject: Re: s-hash documentation X-IMAPbase: 1279770018 1 Status: O X-Status: X-Keywords: X-UID: 1   I hope we are all in the same page, the following link  http://csrc.nist.gov/groups/ST/hash/sha-3/Submission_Reqs/ref_and_optim.html describes the requirements for submission.   if summarized: -- Reference Platform: Wintel personal computer, with an Intel Core 2 Duo Processor, 2.4GHz clock speed, 2GB RAM, running Windows Vista Ultimate 32-bit (x86) and 64-bit (x64) Edition. -- Compiler: the ANSI C compiler in the Microsoft Visual Studio 2005 Professional Edition. -- See the attached API Specification for further information.   -- Test Vectors: Please see Description of Known Answer Test (KAT) and Monte Carlo Test (MCT) for SHA-3 Candidate Algorithm Submissions and Test files and Source Code for Conducting KAT and MCT for details.   -- Intermediate Values   -- optical media: For the portions of the submissions that may be provided electronically, the information shall be provided on a single CD-ROM or DVD using the ISO 9660 format. This disc shall have the following structure: * \README * \Reference_Implementation * \Optimized_32bit * \Optimized_64bit * \KAT_MCT * \Supporting_Documentation * \Additional_Implementations   did you make any job distribution to cover these tasks? these are most important issues at the moment. Whoever dealing with the implementation should address these topics immediately.   thanks... gokay     On Tue, Oct 28, 2008 at 3:39 PM, Cody Walker wrote: > > Hi,  > I looked at the maple code and ran some tests. The output doesn't match that of our code, but I think I have found one of the reasons. Your program seems to add an incorrect length in the padding process (at least in the short test messages I tried). I tried to look into the issue, but I can't find where this happens in the code. Can you try to fix the issue (or explain why this behavior is correct).  > Thanks, > Cody > > > > On Oct 28, 2008, at 2:49 AM, "Gokay Saldamli" wrote: > >   > Dear Megan, > First let me see what you have done so far.  > today and tomorrow I will be out off office and will be working on these issues. > gokay  >   > PS. At last I finished the the working maple 8 code for whole shash including > the hash generation for different hash sizes. >   > ---------- Forwarded message ---------- > From: Megan L. Maguire > Date: Tue, Oct 28, 2008 at 7:09 AM > Subject: s-hash documentation > To: Gokay Saldamli > Cc: koc > > > So the deadline for submission is rapidly approaching, and we are desperately trying to finish the required documentation. However the design rationale and security analysis sections are giving us trouble, mainly because we simply don't know a lot about why s-hash is secure or what you took into consideration when designing it. Also, we need more explicit information on the advantages and disadvantages of s-hash, and it's ability to be implemented on platforms with limited resources, etc. Basically, we have the math background and algorithm description sections done, but we need help with everything else. > > -- > Megan L. Maguire > mmaguire@umail.ucsb.edu > > *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* *panic* *hyperventilate* > > >