R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)
In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge...
Gespeichert in:
Veröffentlicht in: | International Journal of Computer Science and Information Technology 2012-12, Vol.4 (6), p.159-168 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 168 |
---|---|
container_issue | 6 |
container_start_page | 159 |
container_title | International Journal of Computer Science and Information Technology |
container_volume | 4 |
creator | Dey, Dhananjoy |
description | In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash. |
doi_str_mv | 10.5121/ijcsit.2012.4612 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1365128131</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1365128131</sourcerecordid><originalsourceid>FETCH-LOGICAL-c741-c05ff645f171bb55cae5082254eb05325f90cec0eea4520d4bab75a92e5480853</originalsourceid><addsrcrecordid>eNot0MFLwzAUBvAgCo65u8cc56HzJc1LO28y7CYMpmOeQ5qlGmmbmbTC_vutbJf3Hh8f7_Aj5JHBDBlnz-7XRNfNODA-E5LxGzKCeYZJmnN5e72FlHBPJjG6EkDyPJMsG5HFNlnp-PNCh0mLvjWd8y39iq79plvd7n1DP3u9D7pzhn74-tj6xuk60s2_DXRZTPnTA7mrzomdXPeY7Iq33WKVrDfL98XrOjGZYIkBrCopsGIZK0tEoy1CzjkKWwKmHKs5GGvAWi2Qw16UusxQz7lFkUOO6ZhML28Pwf_1NnaqcdHYutat9X1ULJVnjJyl7FyFS9UEH2OwlToE1-hwVAzUIKYuYmoQU4NYegIei13N</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1365128131</pqid></control><display><type>article</type><title>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Dey, Dhananjoy</creator><creatorcontrib>Dey, Dhananjoy</creatorcontrib><description>In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.</description><identifier>ISSN: 0975-4660</identifier><identifier>EISSN: 0975-3826</identifier><identifier>DOI: 10.5121/ijcsit.2012.4612</identifier><language>eng</language><subject>Compressing ; Computer information security ; Construction ; Hafnium ; Hash based algorithms ; Information systems ; Mathematical analysis ; Mathematical models</subject><ispartof>International Journal of Computer Science and Information Technology, 2012-12, Vol.4 (6), p.159-168</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Dey, Dhananjoy</creatorcontrib><title>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</title><title>International Journal of Computer Science and Information Technology</title><description>In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.</description><subject>Compressing</subject><subject>Computer information security</subject><subject>Construction</subject><subject>Hafnium</subject><subject>Hash based algorithms</subject><subject>Information systems</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><issn>0975-4660</issn><issn>0975-3826</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNot0MFLwzAUBvAgCo65u8cc56HzJc1LO28y7CYMpmOeQ5qlGmmbmbTC_vutbJf3Hh8f7_Aj5JHBDBlnz-7XRNfNODA-E5LxGzKCeYZJmnN5e72FlHBPJjG6EkDyPJMsG5HFNlnp-PNCh0mLvjWd8y39iq79plvd7n1DP3u9D7pzhn74-tj6xuk60s2_DXRZTPnTA7mrzomdXPeY7Iq33WKVrDfL98XrOjGZYIkBrCopsGIZK0tEoy1CzjkKWwKmHKs5GGvAWi2Qw16UusxQz7lFkUOO6ZhML28Pwf_1NnaqcdHYutat9X1ULJVnjJyl7FyFS9UEH2OwlToE1-hwVAzUIKYuYmoQU4NYegIei13N</recordid><startdate>20121231</startdate><enddate>20121231</enddate><creator>Dey, Dhananjoy</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20121231</creationdate><title>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</title><author>Dey, Dhananjoy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c741-c05ff645f171bb55cae5082254eb05325f90cec0eea4520d4bab75a92e5480853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Compressing</topic><topic>Computer information security</topic><topic>Construction</topic><topic>Hafnium</topic><topic>Hash based algorithms</topic><topic>Information systems</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><toplevel>online_resources</toplevel><creatorcontrib>Dey, Dhananjoy</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International Journal of Computer Science and Information Technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dey, Dhananjoy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</atitle><jtitle>International Journal of Computer Science and Information Technology</jtitle><date>2012-12-31</date><risdate>2012</risdate><volume>4</volume><issue>6</issue><spage>159</spage><epage>168</epage><pages>159-168</pages><issn>0975-4660</issn><eissn>0975-3826</eissn><abstract>In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.</abstract><doi>10.5121/ijcsit.2012.4612</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-4660 |
ispartof | International Journal of Computer Science and Information Technology, 2012-12, Vol.4 (6), p.159-168 |
issn | 0975-4660 0975-3826 |
language | eng |
recordid | cdi_proquest_miscellaneous_1365128131 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Compressing Computer information security Construction Hafnium Hash based algorithms Information systems Mathematical analysis Mathematical models |
title | R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T21%3A27%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=R-Hash:%20Hash%20Function%20Using%20Random%20Quadratic%20Polynomials%20Over%20GF(2)&rft.jtitle=International%20Journal%20of%20Computer%20Science%20and%20Information%20Technology&rft.au=Dey,%20Dhananjoy&rft.date=2012-12-31&rft.volume=4&rft.issue=6&rft.spage=159&rft.epage=168&rft.pages=159-168&rft.issn=0975-4660&rft.eissn=0975-3826&rft_id=info:doi/10.5121/ijcsit.2012.4612&rft_dat=%3Cproquest_cross%3E1365128131%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1365128131&rft_id=info:pmid/&rfr_iscdi=true |