STITCH-256: A dedicated cryptographic hash function

Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.
Other Authors: 36682671900
Format: Article
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-30338
record_format dspace
spelling my.uniten.dspace-303382023-12-29T15:46:51Z STITCH-256: A dedicated cryptographic hash function Jamil N. Mahmod R. Z'aba M.R. Udzir N.I. Zukarnain Z.A. 36682671900 6506085008 24726154700 8662597200 23399234800 Cellular automata mles Collision resistance Cryptographc boolean functiom Differential attack Hash function Authentication Cellular automata Collision paths Collision resistance Cryptographc boolean functiom Cryptographic community Cryptographic hash functions Differential attack Hashing algorithms High probability Message authentication Message digests Security analysis Hash functions Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. � 2012 Asian Network for Scientific Information. Final 2023-12-29T07:46:51Z 2023-12-29T07:46:51Z 2012 Article 10.3923/jas.2012.1526.1536 2-s2.0-84866237765 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84866237765&doi=10.3923%2fjas.2012.1526.1536&partnerID=40&md5=2f45c37bb68e2bd0267c1ca2546164ec https://irepository.uniten.edu.my/handle/123456789/30338 12 15 1526 1536 Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Cellular automata mles
Collision resistance
Cryptographc boolean functiom
Differential attack
Hash function
Authentication
Cellular automata
Collision paths
Collision resistance
Cryptographc boolean functiom
Cryptographic community
Cryptographic hash functions
Differential attack
Hashing algorithms
High probability
Message authentication
Message digests
Security analysis
Hash functions
spellingShingle Cellular automata mles
Collision resistance
Cryptographc boolean functiom
Differential attack
Hash function
Authentication
Cellular automata
Collision paths
Collision resistance
Cryptographc boolean functiom
Cryptographic community
Cryptographic hash functions
Differential attack
Hashing algorithms
High probability
Message authentication
Message digests
Security analysis
Hash functions
Jamil N.
Mahmod R.
Z'aba M.R.
Udzir N.I.
Zukarnain Z.A.
STITCH-256: A dedicated cryptographic hash function
description Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success. � 2012 Asian Network for Scientific Information.
author2 36682671900
author_facet 36682671900
Jamil N.
Mahmod R.
Z'aba M.R.
Udzir N.I.
Zukarnain Z.A.
format Article
author Jamil N.
Mahmod R.
Z'aba M.R.
Udzir N.I.
Zukarnain Z.A.
author_sort Jamil N.
title STITCH-256: A dedicated cryptographic hash function
title_short STITCH-256: A dedicated cryptographic hash function
title_full STITCH-256: A dedicated cryptographic hash function
title_fullStr STITCH-256: A dedicated cryptographic hash function
title_full_unstemmed STITCH-256: A dedicated cryptographic hash function
title_sort stitch-256: a dedicated cryptographic hash function
publishDate 2023
_version_ 1806424183006035968
score 13.214268