Whirlpool makes use of the construction Now notice that the key schedule for Whirlpool resembles encryption of
Question:
Whirlpool makes use of the construction
Now notice that the key schedule for Whirlpool resembles encryption of the cipher key under a pseudo-key defined by the round constants, so that the core of the hashing process could be formally viewed as two interacting encryption lines. Consider the encryption
We could write the final round key for this block as
Now show that the two hash constructions are essentially equivalent because of the way that the key schedule is defined.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: