首页    期刊浏览 2024年12月04日 星期三
登录注册

文章基本信息

  • 标题:Cryptanalytic JH and BLAKE Hash Function for Authentication and Proposed Work Over BLAKE-256 Using C
  • 本地全文:下载
  • 作者:Mr. Somil Jain ; Mr. Vaibhav Doshi ; Mr. Tarun Goyal
  • 期刊名称:International Journal of Computer Trends and Technology
  • 电子版ISSN:2231-2803
  • 出版年度:2013
  • 卷号:4
  • 期号:6-3
  • 出版社:Seventh Sense Research Group
  • 摘要:Hash functions form an important category of cryptography, which is widely used in a great number of protocols and security mechanisms. Hash functions are a fundamental primitive category of security science. It is defined as computationally efficient function, which maps binary strings of arbitrary length to binary strings of fixed length. The last ones are the outputs of a hash computation and they are called hash values. Hash functions are applied to support digital signatures, data integrity, random number generators, authentication schemes, and data integrity mechanisms. National Institute of Standard and technology (NIST) has selected the 14 Second Round Candidates of the SHA3 Competition. It focus on the new SHA3 competition, started by the NIST, which searches for a new hash function in response to authentication concerns regarding the previous hash functions SHA1 and the SHA2 family. This work is based on comparative study of two SHA3 cryptographic hash function candidates JH and BLAKE (out of fourteen). It compares the common features of both candidates which is widely used in above mentioned applications and improvement over SHA256 with proposed work BLAKE256 hash function.SHA256 is used 64 rounds to calculate 256 bit final hash value with 256 bit initial hash value but BLAKE256 is used 14 rounds to calculate final hash value with same input length and same output length.
  • 关键词:SHA-3; JH ;BLAKE ; Hash; Compression Function
国家哲学社会科学文献中心版权所有