Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard Crabtree Schroeppel is active.

Publication


Featured researches published by Richard Crabtree Schroeppel.


selected areas in cryptography | 2001

A Simple Algebraic Representation of Rijndael

Niels Ferguson; Richard Crabtree Schroeppel; Doug Whiting

We show that there is a very straightforward closed algebraic formula for the Rijndael block cipher. This formula is highly structured and far simpler then algebraic formulations of any other block cipher we know. The security of Rijndael depends on a new and untested hardness assumption: it is computationally infeasible to solve equations of this type. The lack of research on this new assumption raises concerns over the wisdom of using Rijndael for security-critical applications.


cryptographic hardware and embedded systems | 2002

A Low-Power Design for an Elliptic Curve Digital Signature Chip

Richard Crabtree Schroeppel; Cheryl L. Beaver; Rita A. Gonzales; Russell D. Miller; Timothy J. Draelos

We present a VHDL design that incorporates optimizations intended to provide digital signature generation with as little power, space, and time as possible. These three primary objectives of power, size, and speed must be balanced along with other important goals, including flexibility of the hardware and ease of use. The highest-level function offered by our hardware design is Elliptic Curve Optimal El Gamal digital signature generation. Our parameters are defined over the finite field GF(2178), which gives security that is roughly equivalent to that provided by 1500-bit RSA signatures.Our optimizations include using the point-halving algorithm for elliptic curves, field towers to speed up the finite field arithmetic in general, and further enhancements of basic finite field arithmetic operations. The result is a synthesized VHDL digital signature design (using a CMOS 0.5µm, 5V, 25°C library) of 191,000 gates that generates a signature in 4.4 ms at 20 MHz.


australasian conference on information security and privacy | 2004

ManTiCore: Encryption with Joint Cipher-State Authentication

Erik Anderson; Cheryl L. Beaver; Timothy J. Draelos; Richard Crabtree Schroeppel; Mark Dolan Torgerson

We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: The encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined; The authentication overhead is minimal; The authentication process remains resistant against some IV reuse. Our first construction is the MTC4 encryption algorithm based on cryptographic hash functions which supports variable block sizes up to twice the hash output length, and variable key lengths. A proof of security is presented for MTC4. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We give a concrete example using AES as the encryption primitive. We provide performance measurements for all constructions.


Archive | 2004

Manticore and CS Mode: Parallelizable Encryption with Joint Cipher-State Authentication

Mark Dolan Torgerson; Timothy J. Draelos; Richard Crabtree Schroeppel; Russell D. Miller; Cheryl L. Beaver; William Erik Anderson

We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof of security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.


Other Information: PBD: 1 Sep 2002 | 2002

A Low-Power VHDL Design for an Elliptic Curve Digital Signature Chip

Richard Crabtree Schroeppel; Cheryl L. Beaver; Timothy J. Draelos; Rita A. Gonzales; Russell D. Miller

The authors present a VHDL design that incorporates optimizations intended to provide digital signature generation with as little power, space, and time as possible. These three primary objectives of power, size, and speed must be balanced along with other important goals, including flexibility of the hardware and ease of use. The highest-level function doffered by their hardware design is Elliptic Curve Optimal El Gamal digital signature generation. The parameters are defined over the finite field GF(2{sup 178}), which gives security that is roughly equivalent to that provided by 1500-bit RSA signatures. The optimizations include using the point-halving algorithm for elliptic curves, field towers to speed up the finite field arithmetic in general, and further enhancements of basic finite field arithmetic operations. The result is a synthesized VHDL digital signature design (using a CMOS 0.5{micro}m, 5V, 25 C library) of 191,000 gates that generates a signature in 4.4 ms at 20 MHz.


Archive | 2009

Parallelism of the SANDstorm Hash Algorithm

Mark Dolan Torgerson; Timothy J. Draelos; Richard Crabtree Schroeppel

Mainstream cryptographic hashing algorithms are not parallelizable. This limits their speed and they are not able to take advantage of the current trend of being run on multi-core platforms. Being limited in speed limits their usefulness as an authentication mechanism in secure communications. Sandia researchers have created a new cryptographic hashing algorithm, SANDstorm, which was specifically designed to take advantage of multi-core processing and be parallelizable on a wide range of platforms. This report describes a late-start LDRD effort to verify the parallelizability claims of the SANDstorm designers. We have shown, with operating code and bench testing, that the SANDstorm algorithm may be trivially parallelized on a wide range of hardware platforms. Implementations using OpenMP demonstrates a linear speedup with multiple cores. We have also shown significant performance gains with optimized C code and the use of assembly instructions to exploit particular platform capabilities.


Archive | 2005

Small circuits for cryptography.

Mark Dolan Torgerson; Timothy J. Draelos; Richard Crabtree Schroeppel; Russell D. Miller; William Erik Anderson

This report examines a number of hardware circuit design issues associated with implementing certain functions in FPGA and ASIC technologies. Here we show circuit designs for AES and SHA-1 that have an extremely small hardware footprint, yet show reasonably good performance characteristics as compared to the state of the art designs found in the literature. Our AES performance numbers are fueled by an optimized composite field S-box design for the Stratix chipset. Our SHA-1 designs use register packing and feedback functionalities of the Stratix LE, which reduce the logic element usage by as much as 72% as compared to other SHA-1 designs.


Archive | 2003

Algorithms for Improved Performance in Cryptographic Protocols

Richard Crabtree Schroeppel; Cheryl L. Beaver

Public key cryptographic algorithms provide data authentication and non-repudiation for electronic transmissions. The mathematical nature of the algorithms, however, means they require a significant amount of computation, and encrypted messages and digital signatures possess high bandwidth. Accordingly, there are many environments (e.g. wireless, ad-hoc, remote sensing networks) where public-key requirements are prohibitive and cannot be used. The use of elliptic curves in public-key computations has provided a means by which computations and bandwidth can be somewhat reduced. We report here on the research conducted in an LDRD aimed to find even more efficient algorithms and to make public-key cryptography available to a wider range of computing environments. We improved upon several algorithms, including one for which a patent has been applied. Further we discovered some new problems and relations on which future cryptographic algorithms may be based.


Other Information: PBD: 1 Nov 2000 | 2000

Low-Power Public Key Cryptography

Cheryl L. Beaver; Timothy J. Draelos; Victoria Hamilton; Richard Crabtree Schroeppel; Rita A. Gonzales; Russell D. Miller; Edward V. Thomas

This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.


Archive | 2002

Anonymous authenticated communications

Cheryl L. Beaver; Richard Crabtree Schroeppel; Lillian A. Snyder

Collaboration


Dive into the Richard Crabtree Schroeppel's collaboration.

Top Co-Authors

Avatar

Timothy J. Draelos

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Cheryl L. Beaver

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Mark Dolan Torgerson

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Russell D. Miller

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Rita A. Gonzales

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anand Ganti

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Lyndon G. Pierson

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Brian P. Van Leeuwen

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Donald R. Gallup

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge