The Evaluation Report of SHA-256 Crypt Analysis Hash Function

被引:8
|
作者
Selvakumar, A. Arul Lawrence [1 ]
Ganandhas, C. Suresh [2 ]
机构
[1] Oxford Coll Engn, Dept Comp Sci & Elect, Bangalore, Karnataka, India
[2] Veltech SRS Engn Coll, Dept Comp Sci & Elect, Madras, Tamil Nadu, India
关键词
Crypt Analysis; Cryptographic; COLLISIONS; CRYPTANALYSIS; RIPEMD; MD4;
D O I
10.1109/ICCSN.2009.50
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.
引用
收藏
页码:588 / +
页数:2
相关论文
共 50 条
  • [1] An Optimized Pipelined Architecture of SHA-256 Hash Function
    Padhi, Meelu
    Chaudhari, Ravindra
    2017 7TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED), 2017,
  • [2] Low power and high throughput implementation of SHA-256 Hash function
    Michail, H. E.
    Kakarountas, A. P.
    Milidonis, A.
    Goutis, C. E.
    International E-Conference on Computer Science 2005, 2005, 2 : 170 - 173
  • [3] Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function
    Hlobaz, Artur
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 238 - 241
  • [4] Efficient FPGA Hardware Implementation of Secure Hash Function SHA-256/Blake-256
    Kahri, Fatma
    Mestiri, Hassen
    Bouallegue, Belgacem
    Machhout, Mohsen
    2015 IEEE 12TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2015,
  • [5] The design of a high speed ASIC unit for the hash function SHA-256 (3849512)
    Dadda, L
    Macchetti, M
    Owen, J
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2004, : 70 - 75
  • [6] A Power-efficient Implementation of SHA-256 Hash Function for Embedded Applications
    Binh Kieu-Do-Nguyen
    Trong-Thuc Hoang
    Cong-Kha Pham
    Cuong Pham-Quoc
    2021 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2021), 2021, : 39 - 44
  • [7] Design of High-Throughput SHA-256 Hash Function based on FPGA
    Suhaili, Shamsiah Binti
    Watanabe, Takahiro
    PROCEEDINGS OF THE 2017 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI'17), 2017,
  • [8] Analysis of a SHA-256 variant
    Yoshida, H
    Biryukov, A
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 245 - 260
  • [9] Model-driven Design & Synthesis of the SHA-256 Cryptographic Hash Function in ReWire
    Harrison, William L.
    Procter, Adam M.
    Allwein, Gerard
    PROCEEDINGS OF THE 2016 27TH INTERNATIONAL SYMPOSIUM ON RAPID SYSTEM PROTOTYPING (RSP): SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2016, : 114 - 120
  • [10] Security analysis of SHA-256 and sisters
    Gilbert, H
    Handschuh, H
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 175 - 193