Hash function of finalist SHA-3: analysis study
The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders i...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Helvetic Editions LTD, Switzerland
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/30096/ http://irep.iium.edu.my/30096/ http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf |
id |
iium-30096 |
---|---|
recordtype |
eprints |
spelling |
iium-300962014-07-21T07:02:56Z http://irep.iium.edu.my/30096/ Hash function of finalist SHA-3: analysis study Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. Munthir, Khansaa QA75 Electronic computers. Computer science The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. Thus, for this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in: complexity of security, design and structure, as well as performance and cost, to measure the robustness of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). Therefore, main idea from this comparison and analysis study between the finalist of SHA-3 candidates such as (BLAKE, Grostl, JH, Keccak, and Skein) is to investigate the tight security in the suitable designs of lightweight such as JH and Keccak for the future security of hash function. Moreover, they are investigating the high trade-off in (speed/memory) that implemented in Virtex-7 2000T of FPGAs family hardware. Whereas, excluded the rest of hash functions in this finalist, which are not investigated all the measurements of hash function as mentioned above. Helvetic Editions LTD, Switzerland 2013-04-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. and Munthir, Khansaa (2013) Hash function of finalist SHA-3: analysis study. International Journal of Advanced Computer Science and Information Technology, 2 (2). pp. 1-12. ISSN 2296-1739 http://elvedit.com/journals/IJACSIT/ |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. Munthir, Khansaa Hash function of finalist SHA-3: analysis study |
description |
The National Institute of Standard and Technology (NIST) has suggested different principles for hash
functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement
for the future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between
the hash functions is to be chosen as the winner in the end of 2012, and the beginning of 2013. Thus, for
this reason the paper addresses the comparative and analysis study of the finalist SHA-3 candidates in:
complexity of security, design and structure, as well as performance and cost, to measure the robustness
of the algorithms in this area, through the Fundamentals Security Measurement Factors of Hash Function
(FSMFHF) of Secure Hash Algorithm (SHA). Therefore, main idea from this comparison and analysis study
between the finalist of SHA-3 candidates such as (BLAKE, Grostl, JH, Keccak, and Skein) is to investigate
the tight security in the suitable designs of lightweight such as JH and Keccak for the future security of
hash function. Moreover, they are investigating the high trade-off in (speed/memory) that implemented in
Virtex-7 2000T of FPGAs family hardware. Whereas, excluded the rest of hash functions in this finalist,
which are not investigated all the measurements of hash function as mentioned above. |
format |
Article |
author |
Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. Munthir, Khansaa |
author_facet |
Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. Munthir, Khansaa |
author_sort |
Alshaikhli, Imad Fakhri Taha |
title |
Hash function of finalist SHA-3: analysis study |
title_short |
Hash function of finalist SHA-3: analysis study |
title_full |
Hash function of finalist SHA-3: analysis study |
title_fullStr |
Hash function of finalist SHA-3: analysis study |
title_full_unstemmed |
Hash function of finalist SHA-3: analysis study |
title_sort |
hash function of finalist sha-3: analysis study |
publisher |
Helvetic Editions LTD, Switzerland |
publishDate |
2013 |
url |
http://irep.iium.edu.my/30096/ http://irep.iium.edu.my/30096/ http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf |
first_indexed |
2023-09-18T20:44:11Z |
last_indexed |
2023-09-18T20:44:11Z |
_version_ |
1777409564775284736 |