STITCH-256: A dedicated cryptographic hash function
Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-30338 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-303382023-12-29T15:46:51Z STITCH-256: A dedicated cryptographic hash function Jamil N. Mahmod R. Z'aba M.R. Udzir N.I. Zukarnain Z.A. 36682671900 6506085008 24726154700 8662597200 23399234800 Cellular automata mles Collision resistance Cryptographc boolean functiom Differential attack Hash function Authentication Cellular automata Collision paths Collision resistance Cryptographc boolean functiom Cryptographic community Cryptographic hash functions Differential attack Hashing algorithms High probability Message authentication Message digests Security analysis Hash functions Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. � 2012 Asian Network for Scientific Information. Final 2023-12-29T07:46:51Z 2023-12-29T07:46:51Z 2012 Article 10.3923/jas.2012.1526.1536 2-s2.0-84866237765 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866237765&doi=10.3923%2fjas.2012.1526.1536&partnerID=40&md5=2f45c37bb68e2bd0267c1ca2546164ec https://irepository.uniten.edu.my/handle/123456789/30338 12 15 1526 1536 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Cellular automata mles Collision resistance Cryptographc boolean functiom Differential attack Hash function Authentication Cellular automata Collision paths Collision resistance Cryptographc boolean functiom Cryptographic community Cryptographic hash functions Differential attack Hashing algorithms High probability Message authentication Message digests Security analysis Hash functions |
spellingShingle |
Cellular automata mles Collision resistance Cryptographc boolean functiom Differential attack Hash function Authentication Cellular automata Collision paths Collision resistance Cryptographc boolean functiom Cryptographic community Cryptographic hash functions Differential attack Hashing algorithms High probability Message authentication Message digests Security analysis Hash functions Jamil N. Mahmod R. Z'aba M.R. Udzir N.I. Zukarnain Z.A. STITCH-256: A dedicated cryptographic hash function |
description |
Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. � 2012 Asian Network for Scientific Information. |
author2 |
36682671900 |
author_facet |
36682671900 Jamil N. Mahmod R. Z'aba M.R. Udzir N.I. Zukarnain Z.A. |
format |
Article |
author |
Jamil N. Mahmod R. Z'aba M.R. Udzir N.I. Zukarnain Z.A. |
author_sort |
Jamil N. |
title |
STITCH-256: A dedicated cryptographic hash function |
title_short |
STITCH-256: A dedicated cryptographic hash function |
title_full |
STITCH-256: A dedicated cryptographic hash function |
title_fullStr |
STITCH-256: A dedicated cryptographic hash function |
title_full_unstemmed |
STITCH-256: A dedicated cryptographic hash function |
title_sort |
stitch-256: a dedicated cryptographic hash function |
publishDate |
2023 |
_version_ |
1806424183006035968 |
score |
13.214268 |