Omega network hash construction

Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash v...

Full description

Saved in:
Bibliographic Details
Main Author: Chuah, Chai Wen
Format: Thesis
Language:English
Published: 2009
Subjects:
Online Access:http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf
http://eprints.uthm.edu.my/3706/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uthm.eprints.3706
record_format eprints
spelling my.uthm.eprints.37062022-02-03T01:59:03Z http://eprints.uthm.edu.my/3706/ Omega network hash construction Chuah, Chai Wen QA76 Computer software Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash value. The basic Merkle-Damgard construction runs over the input sequentially, which can lead to problems when the input size is large since the computation time increases linearly. Therefore, an alternative architecture which can reduce the computation time is needed, especially in today's world where multi-core processors and multithreaded programming are common. An Omega Network Hash Construction that can run parallel on multi-core machine has been proposed as alternative hash function's construction. The Omega Network Hash Construction performs better than the Merkle-Damgard construction, and its permutation architecture shows that its security level in term of producing randomness digest value is better than Merkle-Damgard construction. 2009-11 Thesis NonPeerReviewed text en http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf Chuah, Chai Wen (2009) Omega network hash construction. Masters thesis, Universiti Sains Malaysia.
institution Universiti Tun Hussein Onn Malaysia
building UTHM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
url_provider http://eprints.uthm.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Chuah, Chai Wen
Omega network hash construction
description Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash value. The basic Merkle-Damgard construction runs over the input sequentially, which can lead to problems when the input size is large since the computation time increases linearly. Therefore, an alternative architecture which can reduce the computation time is needed, especially in today's world where multi-core processors and multithreaded programming are common. An Omega Network Hash Construction that can run parallel on multi-core machine has been proposed as alternative hash function's construction. The Omega Network Hash Construction performs better than the Merkle-Damgard construction, and its permutation architecture shows that its security level in term of producing randomness digest value is better than Merkle-Damgard construction.
format Thesis
author Chuah, Chai Wen
author_facet Chuah, Chai Wen
author_sort Chuah, Chai Wen
title Omega network hash construction
title_short Omega network hash construction
title_full Omega network hash construction
title_fullStr Omega network hash construction
title_full_unstemmed Omega network hash construction
title_sort omega network hash construction
publishDate 2009
url http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf
http://eprints.uthm.edu.my/3706/
_version_ 1738581158706282496
score 13.160551