Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/6651
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jamil, N. | |
dc.contributor.author | Mahmod, R. | |
dc.contributor.author | Z'aba, M.R. | |
dc.contributor.author | Udzir, N.I. | |
dc.contributor.author | Zukarnain, Z.A. | |
dc.date.accessioned | 2017-12-08T10:01:35Z | - |
dc.date.available | 2017-12-08T10:01:35Z | - |
dc.date.issued | 2012 | |
dc.identifier.uri | http://dspace.uniten.edu.my/jspui/handle/123456789/6651 | - |
dc.description.abstract | Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. © 2012 Asian Network for Scientific Information. | |
dc.title | STITCH-256: A dedicated cryptographic hash function | |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | CCI Scholarly Publication |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.