Use Data-depend Function Build Message Expansion Function

نویسندگان

  • ZiJie Xu
  • Ke Xu
چکیده

We had found functions can be used to fix bits [2] by given differences. We use these functions build a message expansion function. In the message expansion function, there are some bits include message bits and incremental bits produced from message bits, these bits will be used as parameter of date-depend function. This message expansion function will fixed at lease n × 5 . 5 bits with given differences, and any message modification will affect at least 8 data-depend function parameter. Key Word: Message expansion function, Data-depend function, message modification

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Turbo SHA-2

In this paper we describe the construction of Turbo SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but the new hash function has three times more chaining variables, it is more robust and resistant against generic multi-block collision attacks, its design is resistant against generic length extension attacks and it is 2 8 times faster ...

متن کامل

A Secure Hash Function MD-192 With Modified Message Expansion

Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...

متن کامل

A Study on the Function of Mobile Message in the Life of the Youth

Today, mobile and its effective presence in all aspects of human life has become undeniable. The presence compared to the internet and its effect is broader and more progressive. The mobile phones and especially applications such as the SMS services are no longer a technical tool but it has a various media function, cultural, social, economic, political and shaping its own culture. This paper a...

متن کامل

Data-Depend Hash Algorithm

Hash algorithm is the algorithm that computes a fixed size message digest from arbitrary size messages. After SHA-0 was published, some technologys that analyse and attack hash algorithm is developed. The major technologys is Differential attack. Papers[Wy05, Dau05] has explain the attack. Differential attack is the best technique to attack hash function. To attack hash function, it need do the...

متن کامل

The Reuse of Historical Railway Stations in Turkey

In this paper, the build and survived railway stations over the time at which first railway lineconstruction started at Turkey until the present had been examined and the ones which were out of use and lost theiroriginal function with time had been determined. Also the determined building stock had been evaluated based onthe principle of giving new function to the old buildings, in especial of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011