Publication:
STITCH-256: A dedicated cryptographic hash function

dc.citedby2
dc.contributor.authorJamil N.en_US
dc.contributor.authorMahmod R.en_US
dc.contributor.authorZ'aba M.R.en_US
dc.contributor.authorUdzir N.I.en_US
dc.contributor.authorZukarnain Z.A.en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid6506085008en_US
dc.contributor.authorid24726154700en_US
dc.contributor.authorid8662597200en_US
dc.contributor.authorid23399234800en_US
dc.date.accessioned2023-12-29T07:46:51Z
dc.date.available2023-12-29T07:46:51Z
dc.date.issued2012
dc.description.abstractHash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. � 2012 Asian Network for Scientific Information.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.3923/jas.2012.1526.1536
dc.identifier.epage1536
dc.identifier.issue15
dc.identifier.scopus2-s2.0-84866237765
dc.identifier.spage1526
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84866237765&doi=10.3923%2fjas.2012.1526.1536&partnerID=40&md5=2f45c37bb68e2bd0267c1ca2546164ec
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/30338
dc.identifier.volume12
dc.pagecount10
dc.sourceScopus
dc.sourcetitleJournal of Applied Sciences
dc.subjectCellular automata mles
dc.subjectCollision resistance
dc.subjectCryptographc boolean functiom
dc.subjectDifferential attack
dc.subjectHash function
dc.subjectAuthentication
dc.subjectCellular automata
dc.subjectCollision paths
dc.subjectCollision resistance
dc.subjectCryptographc boolean functiom
dc.subjectCryptographic community
dc.subjectCryptographic hash functions
dc.subjectDifferential attack
dc.subjectHashing algorithms
dc.subjectHigh probability
dc.subjectMessage authentication
dc.subjectMessage digests
dc.subjectSecurity analysis
dc.subjectHash functions
dc.titleSTITCH-256: A dedicated cryptographic hash functionen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections