Dynamic SHA
نویسنده
چکیده
In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash function. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It makes the system can resistant against all extant attacks.
منابع مشابه
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this appro...
متن کاملRelaxed Differential Fault Analysis of SHA-3
In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...
متن کاملمروری بر حملات مکعبی، خطای تفاضلی و ساختارهای خطی بر روی تابع کچک(SHA-3)
در سالهای اخیر بررسی امنیت سومین تابع چکیدهساز امن[1] یکی از مهمترین موضوعات مورد توجه پژوهشگران حوزه رمزنگاری بوده است. توابع چکیدهساز در رمزنگاری کاربردهای متعددی دارند. از اینرو امنیت توابع چکیدهساز در مقابل حملات مختلف برای سامانههایی که از آن استفاده میکنند، بسیار مهم است. حملات و تحلیلهای متعددی تا امروز بر روی SHA-3 اعمال شده است؛ اما تاکنون هیچکدام موفق به شکستن آن بهصورت ...
متن کاملOne-Way Hash Functions With Changeable Parameters
In this paper, four new algorithms for improvements of MD5 and SHA-Keyed/Unkeyed MD5 and Keyed/Unkeyed SHA are proposed. We change the mode of ®xed retrieval of the parameters to that of dynamic retrieval of the parameters by applying a mapping between the index phrase and the parameter table. As shown in the experimental result, with 1% degradation of performance, comparing to the original alg...
متن کاملNear-Collision Attack on the Compression Function of Dynamic SHA2
In this paper, we present a near-collision attack on the compression functions of Dynamic SHA2 for all the output sizes. For the Dynamic SHA2-224/256, the complexity is about 2 operations and for the Dynamic SHA2-384/512, the complexity is about 2. 1 Description of Dynamic SHA2 The Dynamic SHA-2 [1] is an iteration cryptographic hash function family which is built with the design components fro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007