R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)

In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Journal of Computer Science and Information Technology 2012-12, Vol.4 (6), p.159-168
1. Verfasser: Dey, Dhananjoy
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 168
container_issue 6
container_start_page 159
container_title International Journal of Computer Science and Information Technology
container_volume 4
creator Dey, Dhananjoy
description In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.
doi_str_mv 10.5121/ijcsit.2012.4612
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1365128131</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1365128131</sourcerecordid><originalsourceid>FETCH-LOGICAL-c741-c05ff645f171bb55cae5082254eb05325f90cec0eea4520d4bab75a92e5480853</originalsourceid><addsrcrecordid>eNot0MFLwzAUBvAgCo65u8cc56HzJc1LO28y7CYMpmOeQ5qlGmmbmbTC_vutbJf3Hh8f7_Aj5JHBDBlnz-7XRNfNODA-E5LxGzKCeYZJmnN5e72FlHBPJjG6EkDyPJMsG5HFNlnp-PNCh0mLvjWd8y39iq79plvd7n1DP3u9D7pzhn74-tj6xuk60s2_DXRZTPnTA7mrzomdXPeY7Iq33WKVrDfL98XrOjGZYIkBrCopsGIZK0tEoy1CzjkKWwKmHKs5GGvAWi2Qw16UusxQz7lFkUOO6ZhML28Pwf_1NnaqcdHYutat9X1ULJVnjJyl7FyFS9UEH2OwlToE1-hwVAzUIKYuYmoQU4NYegIei13N</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1365128131</pqid></control><display><type>article</type><title>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Dey, Dhananjoy</creator><creatorcontrib>Dey, Dhananjoy</creatorcontrib><description>In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.</description><identifier>ISSN: 0975-4660</identifier><identifier>EISSN: 0975-3826</identifier><identifier>DOI: 10.5121/ijcsit.2012.4612</identifier><language>eng</language><subject>Compressing ; Computer information security ; Construction ; Hafnium ; Hash based algorithms ; Information systems ; Mathematical analysis ; Mathematical models</subject><ispartof>International Journal of Computer Science and Information Technology, 2012-12, Vol.4 (6), p.159-168</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Dey, Dhananjoy</creatorcontrib><title>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</title><title>International Journal of Computer Science and Information Technology</title><description>In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.</description><subject>Compressing</subject><subject>Computer information security</subject><subject>Construction</subject><subject>Hafnium</subject><subject>Hash based algorithms</subject><subject>Information systems</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><issn>0975-4660</issn><issn>0975-3826</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNot0MFLwzAUBvAgCo65u8cc56HzJc1LO28y7CYMpmOeQ5qlGmmbmbTC_vutbJf3Hh8f7_Aj5JHBDBlnz-7XRNfNODA-E5LxGzKCeYZJmnN5e72FlHBPJjG6EkDyPJMsG5HFNlnp-PNCh0mLvjWd8y39iq79plvd7n1DP3u9D7pzhn74-tj6xuk60s2_DXRZTPnTA7mrzomdXPeY7Iq33WKVrDfL98XrOjGZYIkBrCopsGIZK0tEoy1CzjkKWwKmHKs5GGvAWi2Qw16UusxQz7lFkUOO6ZhML28Pwf_1NnaqcdHYutat9X1ULJVnjJyl7FyFS9UEH2OwlToE1-hwVAzUIKYuYmoQU4NYegIei13N</recordid><startdate>20121231</startdate><enddate>20121231</enddate><creator>Dey, Dhananjoy</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20121231</creationdate><title>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</title><author>Dey, Dhananjoy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c741-c05ff645f171bb55cae5082254eb05325f90cec0eea4520d4bab75a92e5480853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Compressing</topic><topic>Computer information security</topic><topic>Construction</topic><topic>Hafnium</topic><topic>Hash based algorithms</topic><topic>Information systems</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><toplevel>online_resources</toplevel><creatorcontrib>Dey, Dhananjoy</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International Journal of Computer Science and Information Technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dey, Dhananjoy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)</atitle><jtitle>International Journal of Computer Science and Information Technology</jtitle><date>2012-12-31</date><risdate>2012</risdate><volume>4</volume><issue>6</issue><spage>159</spage><epage>168</epage><pages>159-168</pages><issn>0975-4660</issn><eissn>0975-3826</eissn><abstract>In this paper researchers describe an improved version of HF-hash [7] viz. R-hash: Hash Function Using Random Quadratic Polynomials Over GF(2). The compression function of HF-hash consists of 32 polynomials with 64 variables over GF(2), which were taken from the first 32 polynomials of HFE challenge-1 by forcing last 16 variables as 0. The mode operation used in computing HF-hash was Merkle-Damgard. We have randomly selected 32 quadratic non-homogeneous polynomials having 64 variables over GF(2) in case of R-hash to improve the security of the compression function used in HF-hash. In designing R-hash, we have also changed the mode operation used in HF-hash, because of the theoretical weakness found in the Merkle-Damgard construction. In this paper researchers will prove that R-hash is more secure than HF-hash and SHA-256 as well as we will show that it is also faster than HF-hash.</abstract><doi>10.5121/ijcsit.2012.4612</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0975-4660
ispartof International Journal of Computer Science and Information Technology, 2012-12, Vol.4 (6), p.159-168
issn 0975-4660
0975-3826
language eng
recordid cdi_proquest_miscellaneous_1365128131
source EZB-FREE-00999 freely available EZB journals
subjects Compressing
Computer information security
Construction
Hafnium
Hash based algorithms
Information systems
Mathematical analysis
Mathematical models
title R-Hash: Hash Function Using Random Quadratic Polynomials Over GF(2)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T21%3A27%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=R-Hash:%20Hash%20Function%20Using%20Random%20Quadratic%20Polynomials%20Over%20GF(2)&rft.jtitle=International%20Journal%20of%20Computer%20Science%20and%20Information%20Technology&rft.au=Dey,%20Dhananjoy&rft.date=2012-12-31&rft.volume=4&rft.issue=6&rft.spage=159&rft.epage=168&rft.pages=159-168&rft.issn=0975-4660&rft.eissn=0975-3826&rft_id=info:doi/10.5121/ijcsit.2012.4612&rft_dat=%3Cproquest_cross%3E1365128131%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1365128131&rft_id=info:pmid/&rfr_iscdi=true