Nothing Up My Sleeve Number - Examples

Examples

  • The cipher Khafre, designed in 1989, includes constants from the book A Million Random Digits with 100,000 Normal Deviates, published by the RAND Corporation in 1951.
  • Ron Rivest used the trigonometric sine function to generate constants for the widely-used MD5 hash.
  • The U.S. National Security Agency used the square roots of small integers to produce the constants used in its "Secure Hash Algorithm" SHA-1. The SHA-2 functions use the square roots and cube roots of small primes.
  • The Blowfish encryption algorithm uses the binary representation of π to initialize its key schedule.
  • RFC 3526 describes prime numbers for internet key exchange that are also generated from π.
  • The S-box of the NewDES cipher is derived from the United States Declaration of Independence.
  • The AES candidate DFC derives all of its arbitrary constants, including all entries of the S-box, from the binary expansion of e.
  • The ARIA key schedule uses the binary expansion of 1/π.
  • The key schedule of the RC5 cipher uses binary digits from both e and the golden ratio.
  • The BLAKE hash function, a finalist in the SHA3 competition, uses a table of 16 constant words which are the leading 512 or 1024 bits of the fractional part of π,

Read more about this topic:  Nothing Up My Sleeve Number

Famous quotes containing the word examples:

    In the examples that I here bring in of what I have [read], heard, done or said, I have refrained from daring to alter even the smallest and most indifferent circumstances. My conscience falsifies not an iota; for my knowledge I cannot answer.
    Michel de Montaigne (1533–1592)

    Histories are more full of examples of the fidelity of dogs than of friends.
    Alexander Pope (1688–1744)

    It is hardly to be believed how spiritual reflections when mixed with a little physics can hold people’s attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.
    —G.C. (Georg Christoph)