Cryptographic primitives for driven hashing implementation
Keywords:
hashing, cryptographic primitives, conception of driven hashing, hash constructionsAbstract
The conception of driven hashing was determined according to the known hash constructions analysis. Cryptographic primitives’ requirements are determined and the primitives, that meet the requirements, are defined to implement the conception. The example of the model for compression function synthesis using the cryptographic primitives is suggested in the paper. The direction of further research is determined.References
1. E. Biham. A Framework for Iterative Hash Functions: HAIFA [Електронний ресурс] / E. Biham, O. Dunkelman // COSIC internal report, 2007. — 20 с. — Режим доступу до ресурсу : https://www.cosic.esat.kuleuven.be/publications/article-934.pdf.
2. B. Preneel. Analysis and Design of Cryptographic Hash Functions. PhD thesis [Електронний ресурс] / Bart Preneel. — Katholieke Universiteit Leuven, 1993. — 338 с. — Режим доступу до ресурсу :
http://homes.esat.kuleuven.be/~preneel/phd_preneel_feb1993.pdf.
3. Молдовян Н. А. Криптография: от примитовов к синтезу алгоритмов / Н. А. Молдовян, А. А. Молдовян,
М. А. Еремеев. — СПб. : БХВ-Петербург, 2004. — 448 с.
4. J-P. Aumasson. Cryptanalysis of Dynamic SHA(2) [Електронний ресурс] / J-P. Aumasson, O. Dunkelman,
S. Indesteege and B. Preneel // COSIC publications, 2009. — 18 c. — Режим доступу до ресурсу : https://www.cosic.esat.kuleuven.be/publications/article-1277.pdf.
2. B. Preneel. Analysis and Design of Cryptographic Hash Functions. PhD thesis [Електронний ресурс] / Bart Preneel. — Katholieke Universiteit Leuven, 1993. — 338 с. — Режим доступу до ресурсу :
http://homes.esat.kuleuven.be/~preneel/phd_preneel_feb1993.pdf.
3. Молдовян Н. А. Криптография: от примитовов к синтезу алгоритмов / Н. А. Молдовян, А. А. Молдовян,
М. А. Еремеев. — СПб. : БХВ-Петербург, 2004. — 448 с.
4. J-P. Aumasson. Cryptanalysis of Dynamic SHA(2) [Електронний ресурс] / J-P. Aumasson, O. Dunkelman,
S. Indesteege and B. Preneel // COSIC publications, 2009. — 18 c. — Режим доступу до ресурсу : https://www.cosic.esat.kuleuven.be/publications/article-1277.pdf.
Downloads
-
PDF (Українська)
Downloads: 64
Abstract views: 125
Published
2010-11-12
How to Cite
[1]
V. A. Luzhetskyi and Y. V. Baryshev, “Cryptographic primitives for driven hashing implementation”, Вісник ВПІ, no. 1, pp. 108–111, Nov. 2010.
Issue
Section
Information technologies and computer sciences
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).