Javascript must be enabled to continue!
Building a 256-bit hash function on a stronger MD variant
View through CrossRef
AbstractCryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-1, RIPEMD-160 and FORK-256 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgård construction. In this paper we propose a hash function follows design principle of NewFORK-256 and based on HAIFA construction. Its compression function takes three inputs and generates a single output of 256-bit length. An extra input to a compression function is a 64-bit counter (number of bits hashed so far). HAIFA construction shows strong resistance against major generic and other cryptanalytic attacks. The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail. It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.
Title: Building a 256-bit hash function on a stronger MD variant
Description:
AbstractCryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols.
All the MD4 design based hash functions such as MD5, SHA-1, RIPEMD-160 and FORK-256 are built on Merkle-Damgård iterative method.
Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgård construction.
In this paper we propose a hash function follows design principle of NewFORK-256 and based on HAIFA construction.
Its compression function takes three inputs and generates a single output of 256-bit length.
An extra input to a compression function is a 64-bit counter (number of bits hashed so far).
HAIFA construction shows strong resistance against major generic and other cryptanalytic attacks.
The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail.
It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.
Related Results
Bit Performance
Bit Performance
Abstract
Models for Bearing Wear, Teeth Wear and Penetration Rate of bits have been developed Penetration Rate of bits have been developed which give reasonably g...
An Analysis of Noise Characteristics of Drill Bits
An Analysis of Noise Characteristics of Drill Bits
Abstract
There have been papers that analyse the relationship between drill bit design and its vibrational characteristics. These papers typically are based on the a...
An Analysis of Noise Characteristics of Drill Bits
An Analysis of Noise Characteristics of Drill Bits
There have been papers that analyze the relationship between bit design and a bit’s vibrational characteristics. These papers typically are based on the analysis of three-axis near...
Linked List Elimination from Hashing Methods
Linked List Elimination from Hashing Methods
Hashing has been used for decades in many fields such as encryption, password verification, and pattern search. Hash systems consist mainly of three components: the hash function, ...
BIT/SHPS‐1 Enhances Brain‐Derived Neurotrophic Factor‐Promoted Neuronal Survival in Cultured Cerebral Cortical Neurons
BIT/SHPS‐1 Enhances Brain‐Derived Neurotrophic Factor‐Promoted Neuronal Survival in Cultured Cerebral Cortical Neurons
Abstract: Brain‐derived neurotrophic factor (BDNF) activates a variety of signaling molecules to exert various functions in the nervous system, including neuronal differentiation, ...
A Fundamental Model for Prediction of Hole Curvature and Build Rates with Steerable Bottomhole Assemblies
A Fundamental Model for Prediction of Hole Curvature and Build Rates with Steerable Bottomhole Assemblies
ABSTRACT
There are four key technical issues to be addressed when drilling directional wells with steerable bits and bottom hole assemblies: maximizing hole quality,...
Desain PRNG Berbasis Fungsi Hash Menggunakan GIMLI
Desain PRNG Berbasis Fungsi Hash Menggunakan GIMLI
Rangkaian bit acak merupakan komponen penting dalam kriptografi yang digunakan dalam berbagai hal, salah satunya digunakan sebagai kunci masukan dalam algoritme kriptografi. Rangka...
A New Method of Bit Selection using Drill Bit Images
A New Method of Bit Selection using Drill Bit Images
Abstract
Research on bit selection in rotary drilling work and its relationship with different geological, operational parameters and bit type demands an improved pr...

