<s>
LSH	B-Algorithm
is	O
a	O
cryptographic	B-Algorithm
hash	I-Algorithm
function	I-Algorithm
designed	O
in	O
2014	O
by	O
South	O
Korea	O
to	O
provide	O
integrity	O
in	O
general-purpose	O
software	O
environments	O
such	O
as	O
PCs	B-Device
and	O
smart	B-Device
devices	I-Device
.	O
</s>
<s>
LSH	B-Algorithm
is	O
one	O
of	O
the	O
cryptographic	O
algorithms	O
approved	O
by	O
the	O
Korean	O
Cryptographic	O
Module	O
Validation	O
Program	O
(	O
KCMVP	O
)	O
.	O
</s>
<s>
The	O
overall	O
structure	O
of	O
the	O
hash	B-Algorithm
function	I-Algorithm
LSH	B-Algorithm
is	O
shown	O
in	O
the	O
following	O
figure	O
.	O
</s>
<s>
The	O
hash	B-Algorithm
function	I-Algorithm
LSH	B-Algorithm
has	O
the	O
wide-pipe	O
Merkle-Damgård	O
structure	O
with	O
one-zeros	O
padding	O
.	O
</s>
<s>
The	O
message	O
hashing	O
process	O
of	O
LSH	B-Algorithm
consists	O
of	O
the	O
following	O
three	O
stages	O
.	O
</s>
<s>
Generation	O
of	O
an	O
-bit	O
hash	B-Algorithm
value	O
from	O
the	O
final	O
chaining	O
variable	O
.	O
</s>
<s>
The	O
specifications	O
of	O
the	O
hash	B-Algorithm
function	I-Algorithm
LSH	B-Algorithm
are	O
as	O
follows	O
.	O
</s>
<s>
The	O
finalization	O
function	O
returns	O
-bit	O
hash	B-Algorithm
value	O
from	O
the	O
final	O
chaining	O
variable	O
.	O
</s>
<s>
LSH	B-Algorithm
is	O
secure	O
against	O
known	O
attacks	O
on	O
hash	B-Algorithm
functions	I-Algorithm
up	O
to	O
now	O
.	O
</s>
<s>
LSH	B-Algorithm
is	O
collision-resistant	O
for	O
and	O
preimage-resistant	O
and	O
second-preimage-resistant	O
for	O
in	O
the	O
ideal	O
cipher	O
model	O
,	O
where	O
is	O
a	O
number	O
of	O
queries	O
for	O
LSH	B-Algorithm
structure	O
.	O
</s>
<s>
LSH-256	O
is	O
secure	O
against	O
all	O
the	O
existing	O
hash	B-Algorithm
function	I-Algorithm
attacks	O
when	O
the	O
number	O
of	O
steps	O
is	O
13	O
or	O
more	O
,	O
while	O
LSH-512	O
is	O
secure	O
if	O
the	O
number	O
of	O
steps	O
is	O
14	O
or	O
more	O
.	O
</s>
<s>
LSH	B-Algorithm
outperforms	O
SHA-2/3	O
on	O
various	O
software	O
platforms	O
.	O
</s>
<s>
The	O
following	O
table	O
shows	O
the	O
speed	O
performance	O
of	O
1MB	O
message	O
hashing	O
of	O
LSH	B-Algorithm
on	O
several	O
platforms	O
.	O
</s>
<s>
The	O
following	O
table	O
is	O
the	O
comparison	O
at	O
the	O
platform	O
based	O
on	O
Haswell	O
,	O
LSH	B-Algorithm
is	O
measured	O
on	O
Intel	O
Core	O
i7-4770k	O
@	O
3.5	O
GHz	O
quad	O
core	O
platform	O
,	O
and	O
others	O
are	O
measured	O
on	O
Intel	O
Core	O
i5-4570S	O
@	O
2.9	O
GHz	O
quad	O
core	O
platform	O
.	O
</s>
<s>
Test	O
vectors	O
for	O
LSH	B-Algorithm
for	O
each	O
digest	O
length	O
are	O
as	O
follows	O
.	O
</s>
<s>
LSH	B-Algorithm
is	O
free	O
for	O
any	O
use	O
public	O
or	O
private	O
,	O
commercial	O
or	O
non-commercial	O
.	O
</s>
<s>
The	O
source	O
code	O
for	O
distribution	O
of	O
LSH	B-Algorithm
implemented	O
in	O
C	O
,	O
Java	O
,	O
and	O
Python	O
can	O
be	O
downloaded	O
from	O
KISA	O
's	O
cryptography	O
use	O
activation	O
webpage	O
.	O
</s>
<s>
LSH	B-Algorithm
is	O
one	O
of	O
the	O
cryptographic	O
algorithms	O
approved	O
by	O
the	O
Korean	O
Cryptographic	O
Module	O
Validation	O
Program	O
(	O
KCMVP	O
)	O
.	O
</s>
<s>
LSH	B-Algorithm
is	O
included	O
in	O
the	O
following	O
standard	O
.	O
</s>
