Hash function of finalist SHA-3: analysis study

The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders i...

Full description

Bibliographic Details
Main Authors: Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad A., Munthir, Khansaa
Format: Article
Language:English
Published: Helvetic Editions LTD, Switzerland 2013
Subjects:
Online Access:http://irep.iium.edu.my/30096/
http://irep.iium.edu.my/30096/
http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf
id iium-30096
recordtype eprints
spelling iium-300962014-07-21T07:02:56Z http://irep.iium.edu.my/30096/ Hash function of finalist SHA-3: analysis study Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. Munthir, Khansaa QA75 Electronic computers. Computer science The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. Thus, for this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in: complexity of security, design and structure, as well as performance and cost, to measure the robustness of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). Therefore, main idea from this comparison and analysis study between the finalist of SHA-3 candidates such as (BLAKE, Grostl, JH, Keccak, and Skein) is to investigate the tight security in the suitable designs of lightweight such as JH and Keccak for the future security of hash function. Moreover, they are investigating the high trade-off in (speed/memory) that implemented in Virtex-7 2000T of FPGAs family hardware. Whereas, excluded the rest of hash functions in this finalist, which are not investigated all the measurements of hash function as mentioned above. Helvetic Editions LTD, Switzerland 2013-04-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. and Munthir, Khansaa (2013) Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology, 2 (2). pp. 1-12. ISSN 2296-1739 http://elvedit.com/journals/IJACSIT/
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad A.
Munthir, Khansaa
Hash function of finalist SHA-3: analysis study
description The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. Thus, for this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in: complexity of security, design and structure, as well as performance and cost, to measure the robustness of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). Therefore, main idea from this comparison and analysis study between the finalist of SHA-3 candidates such as (BLAKE, Grostl, JH, Keccak, and Skein) is to investigate the tight security in the suitable designs of lightweight such as JH and Keccak for the future security of hash function. Moreover, they are investigating the high trade-off in (speed/memory) that implemented in Virtex-7 2000T of FPGAs family hardware. Whereas, excluded the rest of hash functions in this finalist, which are not investigated all the measurements of hash function as mentioned above.
format Article
author Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad A.
Munthir, Khansaa
author_facet Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad A.
Munthir, Khansaa
author_sort Alshaikhli, Imad Fakhri Taha
title Hash function of finalist SHA-3: analysis study
title_short Hash function of finalist SHA-3: analysis study
title_full Hash function of finalist SHA-3: analysis study
title_fullStr Hash function of finalist SHA-3: analysis study
title_full_unstemmed Hash function of finalist SHA-3: analysis study
title_sort hash function of finalist sha-3: analysis study
publisher Helvetic Editions LTD, Switzerland
publishDate 2013
url http://irep.iium.edu.my/30096/
http://irep.iium.edu.my/30096/
http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf
first_indexed 2023-09-18T20:44:11Z
last_indexed 2023-09-18T20:44:11Z
_version_ 1777409564775284736