Skein TutorialΒΆ

In this example we will analyze an implementation of Skein, a cryptographic hash algorithm that was a finalist in the NIST SHA-3 competition.

We will show how to use TrustInSoft Analyzer to:

  • Get familiar with the code.
  • Search for bugs in the implementation.
  • Prove that the analyzed implementation does not contain any bugs that are in the scope of TrustInSoft Analyzer.

Tutorial Overview