Petra-r cryptographic hash functions

被引:0
|
作者
Najjar, M [1 ]
机构
[1] Appl Sci Univ, Fac Comp Sci & Informat Technol, Amman, Jordan
关键词
cryptography; data integrity; hash functions; data driven hash functions;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present a new cryptographic hash function called Petra-r, where ris an element of{192, 256} is the bitlength of the hash result. In designing Petra-r hash functions we formulated some goals, and one of them is especially crucial: processing an input message, the order of accessing source words should be data driven, i.e., the source words should be defined entirely before processing the input message and should be dependent on this message. We present the structure of the algorithms, results of computational experiments on them, and in Appendix we give procedures implementing the hash functions.
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [31] Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
    Cilardo, Alessandro
    Mazzocca, Nicola
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 810 - 820
  • [32] A systems theoretic approach to the design of scalable cryptographic hash functions
    Scharinger, Josef
    COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 10 - 17
  • [33] Questioning the Criteria for Evaluating Non- Cryptographic Hash Functions
    Hayes, Catherine
    Malone, David
    COMMUNICATIONS OF THE ACM, 2025, 68 (02) : 46 - 51
  • [34] An update on the side channel cryptanalysis of MACs based on cryptographic hash functions
    Gauravaram, Praveen
    Okeya, Katsuyuki
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 393 - +
  • [35] Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    Zhang, Mingwu
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 844 - 876
  • [36] Constructing cryptographic hash functions from fixed-key blockciphers
    Rogaway, Phillip
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 433 - +
  • [37] High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions
    Zhang, Yunlong
    Kim, Joohee
    Choi, Ken
    Shon, Taeshik
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [38] Cryptographic hash functions and low-power techniques for embedded hardware
    Huang, AL
    Penzhorn, WT
    ISIE 2005: PROCEEDINGS OF THE IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS 2005, VOLS 1- 4, 2005, : 1789 - 1794
  • [39] VLSI Implementations of the Cryptographic Hash Functions MD6 and irRUPT
    Henzen, L.
    Carbognani, F.
    Aumasson, J. -Ph.
    O'Neil, S.
    Fichtner, Wolfgang
    ISCAS: 2009 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-5, 2009, : 2914 - +
  • [40] Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
    Claesen, Thomas
    Sateesan, Arish
    Vliegen, Jo
    Mentens, Nele
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 347 - 354