Petra-r cryptographic hash functions

被引:0
|
作者
Najjar, M [1 ]
机构
[1] Appl Sci Univ, Fac Comp Sci & Informat Technol, Amman, Jordan
关键词
cryptography; data integrity; hash functions; data driven hash functions;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present a new cryptographic hash function called Petra-r, where ris an element of{192, 256} is the bitlength of the hash result. In designing Petra-r hash functions we formulated some goals, and one of them is especially crucial: processing an input message, the order of accessing source words should be data driven, i.e., the source words should be defined entirely before processing the input message and should be dependent on this message. We present the structure of the algorithms, results of computational experiments on them, and in Appendix we give procedures implementing the hash functions.
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [41] A technique for boosting the security of cryptographic systems with one-way hash functions
    Koshiba, T
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 76 - 81
  • [42] Building secure and fast cryptographic hash functions using programmable cellular automata
    Computer Sciences Department, Djillali Liabes University of Sidi Bel Abbes, Algeria
    J. Compt. Inf. Technol., 4 (317-328):
  • [43] Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
    Windarta, Susila
    Suryadi, Suryadi
    Ramli, Kalamullah
    Pranggono, Bernardi
    Gunawan, Teddy Surya
    IEEE ACCESS, 2022, 10 : 82272 - 82294
  • [44] Synthetic and real data sets for benchmarking non-cryptographic hash functions
    Saez, Yago
    Estebanez, Cesar
    Quintana, David
    Isasi, Pedro
    DATA IN BRIEF, 2019, 25
  • [45] Hash-One: a lightweight cryptographic hash function
    Mukundan, Puliparambil Megha
    Manayankath, Sindhu
    Srinivasan, Chungath
    Sethumadhavan, Madathil
    IET INFORMATION SECURITY, 2016, 10 (05) : 225 - 231
  • [46] Adaptive Restart and CEGAR-Based Solver for Inverting Cryptographic Hash Functions
    Nejati, Saeed
    Liang, Jia Hui
    Gebotys, Catherine
    Czarnecki, Krzysztof
    Ganesh, Vijay
    VERIFIED SOFTWARE: THEORIES, TOOLS, AND EXPERIMENTS (VSTTE 2017), 2017, 10712 : 120 - 131
  • [47] SMASH - A cryptographic hash function
    Knudsen, LR
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 228 - 242
  • [48] Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware
    Sateesan, Arish
    Biesmans, Jelle
    Claesen, Thomas
    Vliegen, Jo
    Mentens, Nele
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 98
  • [49] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions
    Estevez-Tapiador, Juan M.
    Hernandez-Castro, Julio C.
    Peris-Lopez, Pedro
    Ribagorda, Arturo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (05) : 1485 - 1504
  • [50] Automated design of cryptographic hash schemes by evolving highly-nonlinear functions
    Department of Computer Science, Carlos III University of Madrid, 28911 Legones, Madrid, Spain
    J. Inf. Sci. Eng., 2008, 5 (1485-1504):