Jeffrey Walton
c51f0ecbfd
Make config.h more Autoconf friendly (GH #835 , PR #836 )
2019-05-17 15:18:17 -04:00
Jeffrey Walton
d1b1554188
Add SKIPJACK test vectors from SP800-17, Table 6, pp. 140-42 (GH #824 )
2019-04-27 13:24:54 -04:00
Jeffrey Walton
c6e8a61b8b
Add SHAKE-128 and SHAKE-256 (GH #805 , PR #806 )
2019-02-12 19:51:37 -05:00
Jeffrey Walton
26c83877ef
Add IETF XChaCha (GH #727 , PR #794 )
2019-02-06 01:03:28 -05:00
Jeffrey Walton
dd48a7acef
Fix ChaCha20/Poly1305 when using filters (GH #724 )
2019-01-30 00:55:27 -05:00
Jeffrey Walton
315e54e63d
Add ChaCha20/Poly1305 AEAD cipher (GH #724 )
2019-01-28 08:52:56 -05:00
Jeffrey Walton
e388f2d88d
Add Poly1305TLS algorithm (GH #727 )
...
This is the IETF's rendition of Poly1305 that forgoes AES and the nonce, and uses 16-bytes of the key directly to mac the message
2019-01-27 01:41:53 -05:00
Jeffrey Walton
69286301e0
Add Poly1305(AES) test vectors
2019-01-26 12:54:47 -05:00
Jeffrey Walton
df9fa62205
Use carryless multiplies for NIST b233 and k233 curves (GH #783 , PR #784 )
...
Use carryless multiplies for NIST b233 and k233 curves.
2019-01-16 00:02:04 -05:00
Jeffrey Walton
d62674b561
Add ed25519 (GH #764 , PR #767 )
...
Add ed25519
2018-12-24 17:17:32 -05:00
Jeffrey Walton
704762ba2c
Add Test vectors and data to VS project files
2018-12-15 04:24:30 -05:00
Jeffrey Walton
152ac6177c
Add Moon's curve25519 using SSE2 (GH #761 )
...
Moon's code is very fast. In fact it is so fast it broke our benchmarks. Moon's code registers 0.00 milliseconds and 0.00 megacycles/operation.
2018-12-13 10:19:54 -05:00
Jeffrey Walton
77923a291a
Add Langley's curve25519 (GH #761 , PR# 762)
2018-12-11 16:17:56 -05:00
Jeffrey Walton
8769302a8b
Add CRYPTOPP_DISABLE_MIXED_ASM define and feature test (GH #756 , PR #757 )
2018-12-05 13:22:10 -05:00
Jeffrey Walton
53bdcb2053
Add test_x86_avx512.cxx (GH #753 )
2018-12-04 00:09:56 -05:00
Jeffrey Walton
3db34abf2f
Add Power9 Random Number Generator support (GH #747 , PR #748 )
2018-11-27 02:54:26 -05:00
Jeffrey Walton
3725c8411b
Move CPU_ProbePower7 and CPU_ProbePower8 into their own source files (GH #742 )
2018-11-18 16:35:02 -05:00
Jeffrey Walton
7f5624db7c
Update Filelist
2018-11-17 15:53:52 -05:00
Jeffrey Walton
00fc030fb4
Add test_pthreads.cxx to Filelist
2018-11-13 13:53:15 -05:00
Jeffrey Walton
1070186bc4
Update Filelist.txt
2018-11-12 15:44:05 -05:00
Jeffrey Walton
8011f023b5
Add test programs to file list (PR #737 )
2018-11-11 01:33:41 -05:00
Jeffrey Walton
896225069d
Rename files with dashes to underscores (GH #736 )
...
Also see https://groups.google.com/forum/#!topic/cryptopp-users/HBz-6gZZFOA on the mailing list
2018-11-10 08:00:14 -05:00
Jeffrey Walton
d9011f07d2
Add ChaCha AVX2 implementation (GH #735 )
2018-11-08 16:20:31 -05:00
Jeffrey Walton
5dca85b819
Split Blake2 SIMD files into blake2s-simd.cpp and blake2b-simd.cpp (GH #729 , GH #731 )
...
The split was required for Blake2b and Power8; Blake2s only requires Power7
2018-11-02 19:09:36 -04:00
Jeffrey Walton
916c4484a2
Add ChaCha SSE2 implementation
...
Thanks to Jack Lloyd and Botan for allowing us to use the implementation.
The numbers for SSE2 are very good. When compared with Salsa20 ASM the results are:
* Salsa20 2.55 cpb; ChaCha/20 2.90 cpb
* Salsa20/12 1.61 cpb; ChaCha/12 1.90 cpb
* Salsa20/8 1.34 cpb; ChaCha/8 1.5 cpb
2018-10-23 07:57:59 -04:00
Jeffrey Walton
590f8573c4
Fix LegacyDecryptor and LegacyDecryptorWithMAC (GH #714 )
...
The classes used the wrong hash with the MAC. The legacy gear should have used SHA1, not SHA256.
2018-09-10 21:55:08 -04:00
Jeffrey Walton
4ff34ee329
Add DefaultDecryptorWithMAC using binary file test
...
Also see https://groups.google.com/d/msg/cryptopp-users/QxPxSHkLM-4/pWmoBRuaBQAJ
2018-09-08 12:10:46 -04:00
Jeffrey Walton
40d75271ec
Add keccakc.h and keccakc.cpp to Filelist.txt
2018-08-22 00:54:19 -04:00
Jeffrey Walton
f2171cbe2f
Remove Thread and Socket classes (GH #208 , PR #703 )
...
Also see https://groups.google.com/forum/#!topic/cryptopp-users/5btwLoxXXD4 .
2018-08-17 23:55:39 -04:00
Jeffrey Walton
7a43a04048
Split simon-simd.cpp and speck-simd.cpp into separate source files
...
SIMON-64 and SIMON-128 have different ISA requirements. The same applies to SPECK-64 and SPECK-128. GCC generated code that resulted in a SIGILL due to the ISA differences on a down level machine. The instructions was a mtfprwz from POWER8. It was prsent in a function prologue on a POWER7 machine.
2018-08-15 09:59:40 -04:00
Jeffrey Walton
d51f701e06
Refactor validat5.cpp and validat6.cpp
...
Also see https://groups.google.com/forum/#\!topic/cryptopp-users/j_aQj6r-PoI
2018-07-29 20:30:19 -04:00
Jeffrey Walton
28fe1a6a4d
Split validat*.cpp source files
...
Also see https://groups.google.com/forum/#\!topic/cryptopp-users/j_aQj6r-PoI
2018-07-28 14:57:12 -04:00
Jeffrey Walton
5861d9342d
Split regtest2.cpp into two files
...
Rename regtest3.cpp to regtest4.cpp. Split regtest2.cpp into regtest2.cpp and regtest3.cpp
2018-07-27 18:16:25 -04:00
Jeffrey Walton
1f914feaf9
Split bench1.cpp into two files
...
Renamed bench2.cpp to bench3.cpp. Split bench1.cpp into bench1.cpp and bench2.cpp
2018-07-27 14:13:58 -04:00
Jeffrey Walton
3c21233440
Add AES-NI accelerated SM4 encryption (GH #540 )
...
Thanks to Markku-Juhani Olavi Saarinen for the code. Also see https://github.com/mjosaarinen/sm4ni
2018-07-13 08:33:13 -04:00
Jeffrey Walton
3ff7d7f028
Add ARM AES asm implementation from Cryptogams (GH #683 )
2018-07-11 06:59:44 -04:00
Jeffrey Walton
d7a751b39a
Fix missing test vector in FileList
2018-07-05 19:40:17 -04:00
Jeffrey Walton
a1887d4824
Add missing HC-256
2018-07-05 19:20:35 -04:00
Jeffrey Walton
dd31eb80c0
Add HC-128 stream cipher (GH #679 )
2018-07-05 00:29:07 -04:00
Jeffrey Walton
d00777e1d7
Add Rabbit stream cipher (GH #678 )
2018-07-04 03:47:28 -04:00
Jeffrey Walton
08e6137082
Add SIMECK-64 SSSE3 implementation (GH #675 )
2018-07-01 03:11:00 -04:00
Jeffrey Walton
ac036496d3
Add Simeck lightweight block cipher (GH #675 )
...
Add Simeck lightweight block cipher (GH #675 )
2018-06-30 02:43:12 -04:00
Jeffrey Walton
2f5b110b52
Add HIGHT lightweight block cipher (GH #672 )
2018-06-24 00:54:16 -04:00
Jeffrey Walton
9980d30734
Add LEA-128 NEON and ARMv8 implementation (GH #669 )
...
LEA-128(128) from 35.6 cpb to 14.11 cpb on a LeMaker HiKey dev-board. LEA-128 from 12.60 cpb to 11.89 cpb on AMD Opteron 1100.
2018-06-23 03:54:51 -04:00
Jeffrey Walton
6138829572
Add CHAM128 SSSE3 implementation (PR #670 )
...
CHAM-128(128) from 10.5 cpb to 4.1 cpb. CHAM-128(256) from 12.5 cpb to 4.7 cpb.
2018-06-19 18:03:28 -04:00
Jeffrey Walton
54d5100344
Add CHAM lightweight block cipher (PR #670 )
...
Add CHAM lightweight block cipher
2018-06-17 23:24:47 -04:00
Jeffrey Walton
1f06c512c4
Add LEA lightweight block cipher (GH #669 )
2018-06-17 22:36:41 -04:00
Jeffrey Walton
64d02e3a18
Add scrypt key derivation function (GH #613 , PR #626 )
2018-03-31 20:09:38 -04:00
Jeffrey Walton
e416b243d3
Re-add Simon and Speck, enable SSE (GH #585 )
...
This commit re-adds Simon and Speck. The commit includes C++, SSSE3 and SSE4. NEON, Aarch32 and Aarch64 are disabled at the moment.
2018-02-18 23:23:50 -05:00
Jeffrey Walton
15b14cc618
Remove Simon and Speck ciphers (GH #585 )
...
We recently learned our Simon and Speck implementation was wrong. The removal will stop harm until we can loop back and fix the issue.
The issue is, the paper, the test vectors and the ref-impl do not align. Each produces slightly different result. We followed the test vectors but they turned out to be wrong for the ciphers.
We have one kernel test vector but we don't have a working implementation to observe it to fix our implementation. Ugh...
2018-02-14 04:06:16 -05:00