Publication: STITCH-256: A dedicated cryptographic hash function
dc.citedby | 2 | |
dc.contributor.author | Jamil N. | en_US |
dc.contributor.author | Mahmod R. | en_US |
dc.contributor.author | Z'aba M.R. | en_US |
dc.contributor.author | Udzir N.I. | en_US |
dc.contributor.author | Zukarnain Z.A. | en_US |
dc.contributor.authorid | 36682671900 | en_US |
dc.contributor.authorid | 6506085008 | en_US |
dc.contributor.authorid | 24726154700 | en_US |
dc.contributor.authorid | 8662597200 | en_US |
dc.contributor.authorid | 23399234800 | en_US |
dc.date.accessioned | 2023-12-29T07:46:51Z | |
dc.date.available | 2023-12-29T07:46:51Z | |
dc.date.issued | 2012 | |
dc.description.abstract | Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. � 2012 Asian Network for Scientific Information. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.3923/jas.2012.1526.1536 | |
dc.identifier.epage | 1536 | |
dc.identifier.issue | 15 | |
dc.identifier.scopus | 2-s2.0-84866237765 | |
dc.identifier.spage | 1526 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866237765&doi=10.3923%2fjas.2012.1526.1536&partnerID=40&md5=2f45c37bb68e2bd0267c1ca2546164ec | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/30338 | |
dc.identifier.volume | 12 | |
dc.pagecount | 10 | |
dc.source | Scopus | |
dc.sourcetitle | Journal of Applied Sciences | |
dc.subject | Cellular automata mles | |
dc.subject | Collision resistance | |
dc.subject | Cryptographc boolean functiom | |
dc.subject | Differential attack | |
dc.subject | Hash function | |
dc.subject | Authentication | |
dc.subject | Cellular automata | |
dc.subject | Collision paths | |
dc.subject | Collision resistance | |
dc.subject | Cryptographc boolean functiom | |
dc.subject | Cryptographic community | |
dc.subject | Cryptographic hash functions | |
dc.subject | Differential attack | |
dc.subject | Hashing algorithms | |
dc.subject | High probability | |
dc.subject | Message authentication | |
dc.subject | Message digests | |
dc.subject | Security analysis | |
dc.subject | Hash functions | |
dc.title | STITCH-256: A dedicated cryptographic hash function | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |