Examples
- The cipher Khafre, designed in 1989, includes constants from the book A Million Random Digits with 100,000 Normal Deviates, published by the RAND Corporation in 1951.
- Ron Rivest used the trigonometric sine function to generate constants for the widely-used MD5 hash.
- The U.S. National Security Agency used the square roots of small integers to produce the constants used in its "Secure Hash Algorithm" SHA-1. The SHA-2 functions use the square roots and cube roots of small primes.
- The Blowfish encryption algorithm uses the binary representation of π to initialize its key schedule.
- RFC 3526 describes prime numbers for internet key exchange that are also generated from π.
- The S-box of the NewDES cipher is derived from the United States Declaration of Independence.
- The AES candidate DFC derives all of its arbitrary constants, including all entries of the S-box, from the binary expansion of e.
- The ARIA key schedule uses the binary expansion of 1/π.
- The key schedule of the RC5 cipher uses binary digits from both e and the golden ratio.
- The BLAKE hash function, a finalist in the SHA3 competition, uses a table of 16 constant words which are the leading 512 or 1024 bits of the fractional part of π,
Read more about this topic: Nothing Up My Sleeve Number
Famous quotes containing the word examples:
“It is hardly to be believed how spiritual reflections when mixed with a little physics can hold peoples attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.”
—G.C. (Georg Christoph)
“In the examples that I here bring in of what I have [read], heard, done or said, I have refrained from daring to alter even the smallest and most indifferent circumstances. My conscience falsifies not an iota; for my knowledge I cannot answer.”
—Michel de Montaigne (15331592)
“Histories are more full of examples of the fidelity of dogs than of friends.”
—Alexander Pope (16881744)