Use Data-depend Function Build Message Expansion Function
نویسندگان
چکیده
We had found functions can be used to fix bits [2] by given differences. We use these functions build a message expansion function. In the message expansion function, there are some bits include message bits and incremental bits produced from message bits, these bits will be used as parameter of date-depend function. This message expansion function will fixed at lease n × 5 . 5 bits with given differences, and any message modification will affect at least 8 data-depend function parameter. Key Word: Message expansion function, Data-depend function, message modification
منابع مشابه
Turbo SHA-2
In this paper we describe the construction of Turbo SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but the new hash function has three times more chaining variables, it is more robust and resistant against generic multi-block collision attacks, its design is resistant against generic length extension attacks and it is 2 8 times faster ...
متن کاملA Secure Hash Function MD-192 With Modified Message Expansion
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...
متن کاملA Study on the Function of Mobile Message in the Life of the Youth
Today, mobile and its effective presence in all aspects of human life has become undeniable. The presence compared to the internet and its effect is broader and more progressive. The mobile phones and especially applications such as the SMS services are no longer a technical tool but it has a various media function, cultural, social, economic, political and shaping its own culture. This paper a...
متن کاملData-Depend Hash Algorithm
Hash algorithm is the algorithm that computes a fixed size message digest from arbitrary size messages. After SHA-0 was published, some technologys that analyse and attack hash algorithm is developed. The major technologys is Differential attack. Papers[Wy05, Dau05] has explain the attack. Differential attack is the best technique to attack hash function. To attack hash function, it need do the...
متن کاملThe Reuse of Historical Railway Stations in Turkey
In this paper, the build and survived railway stations over the time at which first railway lineconstruction started at Turkey until the present had been examined and the ones which were out of use and lost theiroriginal function with time had been determined. Also the determined building stock had been evaluated based onthe principle of giving new function to the old buildings, in especial of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011