Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <39BA870C-1448-4E01-B173-D9CA802ABE75@gmail.com>
Date: Fri, 14 Aug 2015 10:35:19 +0800
From: Lei Zhang <zhanglei.april@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Formats using non-SIMD SHA2 implementations


> On Aug 13, 2015, at 5:42 AM, magnum <john.magnum@...hmail.com> wrote:
> 
> On 2015-08-12 15:26, Lei Zhang wrote:
>> Now I just finished episerver. I took a close look at the rest of the formats in that list, and found a few 'technical' issues.
>> 
>> - For 7z, keepass and pdf, there's AES encryption involved at some step of hashing (and also RC4 in pdf). But so far we don't have a SIMD implementation of AES (or RC4). I'm not sure how to handle this.
> 
> Just do in in scalar code (a loop) after running SIMD for producing the keys! For example, the sevenzip_decrypt() function probably needs no change (but if you change it, be sure not to break non-SIMD builds).

I traced the execution of 7z's encryption: the size the hashed message could be really big, far beyond even 4 SHA2 input blocks. I think it's not possible to do the hashing with a single call to SIMDSHA256body(). 

Is there a way to repeatedly invoking SIMDSHA256body() just like SHA256_Update()?


Lei

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.