aboutsummaryrefslogtreecommitdiffstats
path: root/java/SHA3.java
diff options
context:
space:
mode:
Diffstat (limited to 'java/SHA3.java')
-rw-r--r--java/SHA3.java80
1 files changed, 34 insertions, 46 deletions
diff --git a/java/SHA3.java b/java/SHA3.java
index f71b355..5b4796e 100644
--- a/java/SHA3.java
+++ b/java/SHA3.java
@@ -176,85 +176,73 @@ public class SHA3
for (int i = 0, j = 0; i < 5; i++, j += 5)
SHA3.C[i] = (A[j] ^ A[j + 1]) ^ (A[j + 2] ^ A[j + 3]) ^ A[j + 4];
+ long da, db, dc, dd, de;
+
if (SHA3.w == 64)
{
- /* θ step (step 2 of 3) */
- long da = SHA3.C[4] ^ SHA3.rotate64(SHA3.C[1], 1);
- long db = SHA3.C[0] ^ SHA3.rotate64(SHA3.C[2], 1);
- long dc = SHA3.C[1] ^ SHA3.rotate64(SHA3.C[3], 1);
- long dd = SHA3.C[2] ^ SHA3.rotate64(SHA3.C[4], 1);
- long de = SHA3.C[3] ^ SHA3.rotate64(SHA3.C[0], 1);
-
- /* ρ and π steps, with last part of θ */
- SHA3.B[0] = A[0] ^ da;
- SHA3.B[1] = SHA3.rotate64(A[15] ^ dd, 28);
- SHA3.B[2] = SHA3.rotate64(A[5] ^ db, 1);
- SHA3.B[3] = SHA3.rotate64(A[20] ^ de, 27);
- SHA3.B[4] = SHA3.rotate64(A[10] ^ dc, 62);
+ /* ρ and π steps, with last two part of θ */
+ SHA3.B[0] = A[ 0] ^ (da = SHA3.C[4] ^ SHA3.rotate64(SHA3.C[1], 1));
+ SHA3.B[1] = SHA3.rotate64(A[15] ^ (dd = SHA3.C[2] ^ SHA3.rotate64(SHA3.C[4], 1)), 28);
+ SHA3.B[2] = SHA3.rotate64(A[ 5] ^ (db = SHA3.C[0] ^ SHA3.rotate64(SHA3.C[2], 1)), 1);
+ SHA3.B[3] = SHA3.rotate64(A[20] ^ (de = SHA3.C[3] ^ SHA3.rotate64(SHA3.C[0], 1)), 27);
+ SHA3.B[4] = SHA3.rotate64(A[10] ^ (dc = SHA3.C[1] ^ SHA3.rotate64(SHA3.C[3], 1)), 62);
- SHA3.B[5] = SHA3.rotate64(A[6] ^ db, 44);
+ SHA3.B[5] = SHA3.rotate64(A[ 6] ^ db, 44);
SHA3.B[6] = SHA3.rotate64(A[21] ^ de, 20);
- SHA3.B[7] = SHA3.rotate64(A[11] ^ dc, 6);
- SHA3.B[8] = SHA3.rotate64(A[1] ^ da, 36);
+ SHA3.B[7] = SHA3.rotate64(A[11] ^ dc, 6);
+ SHA3.B[8] = SHA3.rotate64(A[ 1] ^ da, 36);
SHA3.B[9] = SHA3.rotate64(A[16] ^ dd, 55);
SHA3.B[10] = SHA3.rotate64(A[12] ^ dc, 43);
- SHA3.B[11] = SHA3.rotate64(A[2] ^ da, 3);
+ SHA3.B[11] = SHA3.rotate64(A[ 2] ^ da, 3);
SHA3.B[12] = SHA3.rotate64(A[17] ^ dd, 25);
- SHA3.B[13] = SHA3.rotate64(A[7] ^ db, 10);
+ SHA3.B[13] = SHA3.rotate64(A[ 7] ^ db, 10);
SHA3.B[14] = SHA3.rotate64(A[22] ^ de, 39);
SHA3.B[15] = SHA3.rotate64(A[18] ^ dd, 21);
- SHA3.B[16] = SHA3.rotate64(A[8] ^ db, 45);
- SHA3.B[17] = SHA3.rotate64(A[23] ^ de, 8);
+ SHA3.B[16] = SHA3.rotate64(A[ 8] ^ db, 45);
+ SHA3.B[17] = SHA3.rotate64(A[23] ^ de, 8);
SHA3.B[18] = SHA3.rotate64(A[13] ^ dc, 15);
- SHA3.B[19] = SHA3.rotate64(A[3] ^ da, 41);
+ SHA3.B[19] = SHA3.rotate64(A[ 3] ^ da, 41);
SHA3.B[20] = SHA3.rotate64(A[24] ^ de, 14);
SHA3.B[21] = SHA3.rotate64(A[14] ^ dc, 61);
- SHA3.B[22] = SHA3.rotate64(A[4] ^ da, 18);
+ SHA3.B[22] = SHA3.rotate64(A[ 4] ^ da, 18);
SHA3.B[23] = SHA3.rotate64(A[19] ^ dd, 56);
- SHA3.B[24] = SHA3.rotate64(A[9] ^ db, 2);
+ SHA3.B[24] = SHA3.rotate64(A[ 9] ^ db, 2);
}
else
{
- /* θ step (step 2 of 3) */
- long da = SHA3.C[4] ^ SHA3.rotate(SHA3.C[1], 1);
- long db = SHA3.C[0] ^ SHA3.rotate(SHA3.C[2], 1);
- long dc = SHA3.C[1] ^ SHA3.rotate(SHA3.C[3], 1);
- long dd = SHA3.C[2] ^ SHA3.rotate(SHA3.C[4], 1);
- long de = SHA3.C[3] ^ SHA3.rotate(SHA3.C[0], 1);
-
- /*ρ and π steps, with last part of θ */
- SHA3.B[0] = A[0] ^ da;
- SHA3.B[1] = SHA3.rotate(A[15] ^ dd, 28);
- SHA3.B[2] = SHA3.rotate(A[5] ^ db, 1);
- SHA3.B[3] = SHA3.rotate(A[20] ^ de, 27);
- SHA3.B[4] = SHA3.rotate(A[10] ^ dc, 62);
+ /* ρ and π steps, with last two part of θ */
+ SHA3.B[0] = A[ 0] ^ (da = SHA3.C[4] ^ SHA3.rotate(SHA3.C[1], 1));
+ SHA3.B[1] = SHA3.rotate(A[15] ^ (dd = SHA3.C[2] ^ SHA3.rotate(SHA3.C[4], 1)), 28);
+ SHA3.B[2] = SHA3.rotate(A[ 5] ^ (db = SHA3.C[0] ^ SHA3.rotate(SHA3.C[2], 1)), 1);
+ SHA3.B[3] = SHA3.rotate(A[20] ^ (de = SHA3.C[3] ^ SHA3.rotate(SHA3.C[0], 1)), 27);
+ SHA3.B[4] = SHA3.rotate(A[10] ^ (dc = SHA3.C[1] ^ SHA3.rotate(SHA3.C[3], 1)), 62);
- SHA3.B[5] = SHA3.rotate(A[6] ^ db, 44);
+ SHA3.B[5] = SHA3.rotate(A[ 6] ^ db, 44);
SHA3.B[6] = SHA3.rotate(A[21] ^ de, 20);
- SHA3.B[7] = SHA3.rotate(A[11] ^ dc, 6);
- SHA3.B[8] = SHA3.rotate(A[1] ^ da, 36);
+ SHA3.B[7] = SHA3.rotate(A[11] ^ dc, 6);
+ SHA3.B[8] = SHA3.rotate(A[ 1] ^ da, 36);
SHA3.B[9] = SHA3.rotate(A[16] ^ dd, 55);
SHA3.B[10] = SHA3.rotate(A[12] ^ dc, 43);
- SHA3.B[11] = SHA3.rotate(A[2] ^ da, 3);
+ SHA3.B[11] = SHA3.rotate(A[ 2] ^ da, 3);
SHA3.B[12] = SHA3.rotate(A[17] ^ dd, 25);
- SHA3.B[13] = SHA3.rotate(A[7] ^ db, 10);
+ SHA3.B[13] = SHA3.rotate(A[ 7] ^ db, 10);
SHA3.B[14] = SHA3.rotate(A[22] ^ de, 39);
SHA3.B[15] = SHA3.rotate(A[18] ^ dd, 21);
- SHA3.B[16] = SHA3.rotate(A[8] ^ db, 45);
- SHA3.B[17] = SHA3.rotate(A[23] ^ de, 8);
+ SHA3.B[16] = SHA3.rotate(A[ 8] ^ db, 45);
+ SHA3.B[17] = SHA3.rotate(A[23] ^ de, 8);
SHA3.B[18] = SHA3.rotate(A[13] ^ dc, 15);
- SHA3.B[19] = SHA3.rotate(A[3] ^ da, 41);
+ SHA3.B[19] = SHA3.rotate(A[ 3] ^ da, 41);
SHA3.B[20] = SHA3.rotate(A[24] ^ de, 14);
SHA3.B[21] = SHA3.rotate(A[14] ^ dc, 61);
- SHA3.B[22] = SHA3.rotate(A[4] ^ da, 18);
+ SHA3.B[22] = SHA3.rotate(A[ 4] ^ da, 18);
SHA3.B[23] = SHA3.rotate(A[19] ^ dd, 56);
- SHA3.B[24] = SHA3.rotate(A[9] ^ db, 2);
+ SHA3.B[24] = SHA3.rotate(A[ 9] ^ db, 2);
}
/* ξ step */