The subject of this paper, an improbable implementation of a recently standardized cryptographic hash function on a thirty-five-yearold microcomputer, may strike some as unusual and recreative at best. In the tedious discipline of the process, however, lessons were learned in implementation trade-offs for basic cryptographic primitives which may prove interesting in the current context of securing (small to nano) machine to machine communications. More importantly, that such insights might stem out of revisiting how earlier computing platforms relate to the code written on them to cast a distant light on modern connections of code to material, historical and contextual factors certainly illuminates the joys of retrocomputing.
[1]
Ivan Tomek,et al.
Z80 assembly language programming
,
1987
.
[2]
A. Gersho,et al.
Unclassified summary: Involvement of NSA in the development of the data encryption standard
,
1978,
IEEE Communications Society Magazine.
[3]
G. V. Assche,et al.
Permutation-based encryption , authentication and authenticated encryption
,
2012
.
[4]
Thomas Unterluggauer,et al.
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors
,
2013,
INDOCRYPT.
[5]
Nick Montfort,et al.
10 Print Chr$(205.5+rnd(1)); : Goto 10
,
2012,
Software Studies.
[6]
Yuri Takhteyev,et al.
Retrocomputing as preservation and remix
,
2013,
Libr. Hi Tech.