Publication:
Diffusion and statistical analysis of STITCH-256

dc.citedby0
dc.contributor.authorJamil N.en_US
dc.contributor.authorMahmod R.en_US
dc.contributor.authorZ'aba M.R.en_US
dc.contributor.authorUdzir N.I.en_US
dc.contributor.authorZukarnain Z.A.en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid6506085008en_US
dc.contributor.authorid24726154700en_US
dc.contributor.authorid8662597200en_US
dc.contributor.authorid23399234800en_US
dc.date.accessioned2023-12-29T07:43:51Z
dc.date.available2023-12-29T07:43:51Z
dc.date.issued2013
dc.description.abstractHash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random. � 2013 Asian Network for Scientific Information.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.3923/jas.2013.673.682
dc.identifier.epage682
dc.identifier.issue5
dc.identifier.scopus2-s2.0-84879511855
dc.identifier.spage673
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84879511855&doi=10.3923%2fjas.2013.673.682&partnerID=40&md5=b528ba1504e68c19b33973f1bfa656b0
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/29982
dc.identifier.volume13
dc.pagecount9
dc.relation.ispartofAll Open Access; Bronze Open Access
dc.sourceScopus
dc.sourcetitleJournal of Applied Sciences
dc.subjectAvalanche
dc.subjectCryptography
dc.subjectHash function
dc.subjectStatistical analysis
dc.subjectSTITCH-256
dc.subjectAuthentication
dc.subjectAvalanches (snowslides)
dc.subjectCryptography
dc.subjectHash functions
dc.subjectStatistical methods
dc.subjectCryptographic community
dc.subjectCryptographic hash functions
dc.subjectCryptographic primitives
dc.subjectDiffusion properties
dc.subjectMessage authentication
dc.subjectParallel branches
dc.subjectStatistical properties
dc.subjectSTITCH-256
dc.subjectDiffusion
dc.titleDiffusion and statistical analysis of STITCH-256en_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections