Searching \ for 'PICs and encryption - second try.' in subject line. ()
Make payments with PayPal - it's fast, free and secure! Help us get a faster server
FAQ page: www.piclist.com/techref/microchip/devices.htm?key=pic
Search entire site for: 'PICs and encryption - second try.'.

Truncated match.
PICList Thread
'PICs and encryption - second try.'
1998\04\09@122721 by Pavel Korensky

flavicon
face
Hello,

It seems that my first message somehow did not found the way to the list.
So I am trying to send the message once more.

I would like to ask you, if somebody have the assembler source code for
encryption algorithms like Blowfish or IDEA on PIC microcontroller.
Also, I would like to ask you, if anybody have the asm source for hash
functions like SHA or MD5.

Thank you for any answer

PavelK

**************************************************************************
* Pavel Korensky                                                         *
* DATOR3 LAN Services spol. s r.o.                                       *
* Modranska 1895/17, 143 00, Prague 4, Czech Republic                    *
*                                                                        *
* PGP Key fingerprint:  F3 E1 AE BC 34 18 CB A6  CC D0 DA 9E 79 03 41 D4 *
*                                                                        *
* SUMMA SCIENTIA - NIHIL SCIRE                                           *
**************************************************************************

1998\04\09@123941 by John Halleck

flavicon
face
On Thu, 9 Apr 1998, Pavel Korensky wrote:

> Hello,
>
> It seems that my first message somehow did not found the way to the list.
> So I am trying to send the message once more.

 It found its way to the list.

 You don't see your own postings to the list unless you ask for them.
 See the documentation you were sent when you subscribed.

> I would like to ask you, if somebody have the assembler source code for
> encryption algorithms like Blowfish or IDEA on PIC microcontroller.
> Also, I would like to ask you, if anybody have the asm source for hash
> functions like SHA or MD5.

 Code in C is widely availiable for all of those (See, for example,
 "Applied Cryptology" by Bruce Schinier)
 Assembler code for a given machine may be harder to come by.

 There are C compilers for the PIC.

> Thank you for any answer

1998\04\09@124819 by Pavel Korensky

flavicon
face
At 10:38 9.4.1998 -0600, John Halleck wrote:
>  It found its way to the list.
>
>  You don't see your own postings to the list unless you ask for them.
>  See the documentation you were sent when you subscribed.
>

Sorry about the second post. Next time, I will RTFM :-))

{Quote hidden}

Hmmm. This is exactly what I DOES NOT mean by my question. I already have
the C sources for encryption/hash algorithms. Problem is, that none of C
compilers for PIC is able to compile them. I tried it several times, with
several compilers. None of them is able to do this job. So I am asking
about direct assembler implementation.

PavelK

**************************************************************************
* Pavel Korensky                                                         *
* DATOR3 LAN Services spol. s r.o.                                       *
* Modranska 1895/17, 143 00, Prague 4, Czech Republic                    *
*                                                                        *
* PGP Key fingerprint:  F3 E1 AE BC 34 18 CB A6  CC D0 DA 9E 79 03 41 D4 *
*                                                                        *
* SUMMA SCIENTIA - NIHIL SCIRE                                           *
**************************************************************************

1998\04\10@050828 by Marco DI LEO

flavicon
face
> Hmmm. This is exactly what I DOES NOT mean by my question. I already have
> the C sources for encryption/hash algorithms. Problem is, that none of C
> compilers for PIC is able to compile them. I tried it several times, with
> several compilers. None of them is able to do this job. So I am asking
> about direct assembler implementation.

If you can choose the encryption algorithm, take a look at TEA. It uses
a 128 bit key, is believed (by now...) to be cryptographically strong
and it is VERY fast and simple to implement (no table, no S-boxes,
etc.).
The original C code is just NINE lines long using only shift, xor and
additions.
You will get more info at http://vader.brad.ac.uk/tea/tea.shtml

BTW: let me know if you implement TEA. I am going to do the same but I
didn't start yet.

Ciao
  Marco

----
Marco DI LEO                  email: spam_OUTm.dileoTakeThisOuTspamsistinf.it
Sistemi Informativi S.p.A.    tel:   +39 6 50292 300
V. Elio Vittorini, 129        fax:   +39 6 5015991
I-00144 Roma
Italy

1998\04\11@071803 by Alessandro Zummo

flavicon
face
Il 10-Apr-98, Marco DI LEO scrisse:

>> several compilers. None of them is able to do this job. So I am asking
>> about direct assembler implementation.
> If you can choose the encryption algorithm, take a look at TEA. It uses
> a 128 bit key, is believed (by now...) to be cryptographically strong
> and it is VERY fast and simple to implement (no table, no S-boxes,
> etc.).
> BTW: let me know if you implement TEA. I am going to do the same but I
> didn't start yet.

i'm interested too... please le *us* know :-)

--

  - *Alex* -

 http://freepage.logicom.it/azummo/

1998\04\13@160715 by n M. Ranguelov

flavicon
face
Hi !


Pavel Korensky wrote:
>
...
> >> I would like to ask you, if somebody have the assembler source code for
> >> encryption algorithms like Blowfish or IDEA on PIC microcontroller.



I was also looking for an symetric chiper suitable for implementation
on a PIC. Most algorithms use too much RAM or nonlinear mathematical
operations. ( Like IDEA).

IIRC sombody on the list has written a DES implementation, but he lives
in USA and would not like to send the code to Europe. I dont know wich
PIC device he uses. I could dig up the adress so you can ask him by
priv. e-mail.

I find the RC5 algorithm very easy. It should fit into a little PIC
device like 16F84. It uses data dependent shifts combined with additions
and XORs. Key length, chipher block length and the number of iterations
can be adjusted to meet the particular security level needet.

You can search on the internet for the rfc2040 for a description.

I have started implementing it, but still have no time to finish it.
If there is interest i could let the list know when its reay.


> >> Also, I would like to ask you, if anybody have the asm source for hash
> >> functions like SHA or MD5.
> >

I have read IDEA can also be used for hashing and pseudo random number
generation. Don't see why not to use RC5 for hashing ?


Please let me know if you find some good code.

St.

1998\04\15@163023 by Marc Heuler

flavicon
face
Hi Stefan (Stefan M. Ranguelov), in <.....3531E639.1DCAKILLspamspam@spam@informatik.hu-berlin.de> on
Apr 13 you wrote:

> IIRC sombody on the list has written a DES implementation, but he lives
> in USA and would not like to send the code to Europe. I dont know wich
> PIC device he uses. I could dig up the adress so you can ask him by
> priv. e-mail.

I know that Europeans have implemented DES in a C84, too.  Scan the pay tv
pirate sites for old sources or hex files.  Some of these used DES.

More... (looser matching)
- Last day of these posts
- In 1998 , 1999 only
- Today
- New search...