Author:
Tiwari Harshvardhan,Asawa Krishna
Abstract
AbstractCryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-1, RIPEMD-160 and FORK-256 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgård construction. In this paper we propose a hash function follows design principle of NewFORK-256 and based on HAIFA construction. Its compression function takes three inputs and generates a single output of 256-bit length. An extra input to a compression function is a 64-bit counter (number of bits hashed so far). HAIFA construction shows strong resistance against major generic and other cryptanalytic attacks. The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail. It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.
Reference37 articles.
1. A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography (CRC Press, 1997)
2. B. Schneier, Applied Cryptography (John Wiley & Sons, 1996)
3. H. S. Kwok, W. K. S. Tang, A Chaos Based Cryptographic Hash Function for Message Authentication, Int. J. Bifur. Chaos 15, 4043–4050, 2005
4. Y. Li, S. Deng, D. Xiao, A Novel Hash Algorithm Construction Based on Chaotic Neural Network, Neural Comput. Appl. 20, 133–141, 2011
5. Y. Li, D. Xiao, S. Deng, G. Zhou, Improvement and Performance Analysis of a Novel Hash Function Based on Chaotic Neural Network, Neural Comp. Appl. 22, 391–402, 2013
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献