Twofish is a symmetric block cipher which is introduced as a candidate
for the new AES (Advanced Encryption Standard). It is a 16-round Feistel
Networks made up of four key-dependent 8-by-8 bit S-boxes, a fixed 4-by-4
maximum distance separable matrix over GF(28), a pseudo-Hadamard transform,
bitwise rotations, and a carefully designed key schedule. Twofish
accepts variable length keys up to 256 keys.
Twofish encrypts on a Pentium Pro at 17.8 clock cycles per byte, and
an 8-bit smart card implementation encrypts at 1820 clock cycles per byte.
It can be implemented in hardware in 14.000 gates.
Twofish is unpatented and the source code is uncopyrighted.
SHA-1 (Secure Hash Algorithm) produce a 160-bit output called a message
digest for input length less than 2^64 bit.The message digest can then
be input to the Digital Signature Algorithm(DSA) which verifies and generate
the signature for the message. It is called secure because it is computationally
infeasible to find a message which corespondent to a given message
digest or to find two message which produce same message digest. Any change
to a message in the transit will , with a very high probability,
result in a different message digest and the signature is fail to verify
(FIPS Secure Hash Standard).
SHA-1 is the copyright of National Institute of Standard and Technology(NIST),
Computer System Laboratory, US Department of Commerce.
Our goals is to develop a crypto accelerator by adding
a SHA-1, a Twofish block cipher and a 1024 bit ALU
Specifications:
Designing behavioral and structural using VHDL
We have receive the twofish and SHA-1 C-codes and now trying to design the core. We need more people with good C-background to explore the C-codes. The twofish codes are generated bt Mr. Bruce Schneier from The Counterpane Labs and they are free.
Maintainers and Authors :
current members:
Mailing-list: