期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2013
卷号:4
期号:6-3
出版社:Seventh Sense Research Group
摘要:Hash functions form an important category of cryptography, which is widely used in a great number of protocols and security mechanisms. Hash functions are a fundamental primitive category of security science. It is defined as computationally efficient function, which maps binary strings of arbitrary length to binary strings of fixed length. The last ones are the outputs of a hash computation and they are called hash values. Hash functions are applied to support digital signatures, data integrity, random number generators, authentication schemes, and data integrity mechanisms. National Institute of Standard and technology (NIST) has selected the 14 Second Round Candidates of the SHA3 Competition. It focus on the new SHA3 competition, started by the NIST, which searches for a new hash function in response to authentication concerns regarding the previous hash functions SHA1 and the SHA2 family. This work is based on comparative study of two SHA3 cryptographic hash function candidates JH and BLAKE (out of fourteen). It compares the common features of both candidates which is widely used in above mentioned applications and improvement over SHA256 with proposed work BLAKE256 hash function.SHA256 is used 64 rounds to calculate 256 bit final hash value with 256 bit initial hash value but BLAKE256 is used 14 rounds to calculate final hash value with same input length and same output length.