Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/6651
Full metadata record
DC FieldValueLanguage
dc.contributor.authorJamil, N.
dc.contributor.authorMahmod, R.
dc.contributor.authorZ'aba, M.R.
dc.contributor.authorUdzir, N.I.
dc.contributor.authorZukarnain, Z.A.
dc.date.accessioned2017-12-08T10:01:35Z-
dc.date.available2017-12-08T10:01:35Z-
dc.date.issued2012
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/6651-
dc.description.abstractHash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. © 2012 Asian Network for Scientific Information.
dc.titleSTITCH-256: A dedicated cryptographic hash function
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:CCI Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.