Nothing Up My Sleeve Number - Examples

Examples

  • The cipher Khafre, designed in 1989, includes constants from the book A Million Random Digits with 100,000 Normal Deviates, published by the RAND Corporation in 1951.
  • Ron Rivest used the trigonometric sine function to generate constants for the widely-used MD5 hash.
  • The U.S. National Security Agency used the square roots of small integers to produce the constants used in its "Secure Hash Algorithm" SHA-1. The SHA-2 functions use the square roots and cube roots of small primes.
  • The Blowfish encryption algorithm uses the binary representation of π to initialize its key schedule.
  • RFC 3526 describes prime numbers for internet key exchange that are also generated from π.
  • The S-box of the NewDES cipher is derived from the United States Declaration of Independence.
  • The AES candidate DFC derives all of its arbitrary constants, including all entries of the S-box, from the binary expansion of e.
  • The ARIA key schedule uses the binary expansion of 1/π.
  • The key schedule of the RC5 cipher uses binary digits from both e and the golden ratio.
  • The BLAKE hash function, a finalist in the SHA3 competition, uses a table of 16 constant words which are the leading 512 or 1024 bits of the fractional part of π,

Read more about this topic:  Nothing Up My Sleeve Number

Famous quotes containing the word examples:

    It is hardly to be believed how spiritual reflections when mixed with a little physics can hold people’s attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.
    —G.C. (Georg Christoph)

    In the examples that I here bring in of what I have [read], heard, done or said, I have refrained from daring to alter even the smallest and most indifferent circumstances. My conscience falsifies not an iota; for my knowledge I cannot answer.
    Michel de Montaigne (1533–1592)

    Histories are more full of examples of the fidelity of dogs than of friends.
    Alexander Pope (1688–1744)