• DocumentCode
    162183
  • Title

    Implementation of randomize-then-combine constructed hash function

  • Author

    Chi Sing Chum ; Changha Jun ; Xiaowen Zhang

  • Author_Institution
    Comput. Sci. Dept., CUNY, New York, NY, USA
  • fYear
    2014
  • fDate
    9-10 May 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Hash functions, such as SHA (secure hash algorithm) and MD (message digest) families that are built upon Merkle-Damgard construction, suffer many attacks due to the iterative nature of block-by-block message processing. Chum and Zhang [4] proposed a new hash function construction that takes advantage of the randomize-then-combine technique, which was used in the incremental hash functions, to the iterative hash function. In this paper, we implement such hash construction in three ways distinguished by their corresponding padding methods. We conduct the experiment in parallel multi-threaded programming settings. The results show that the speed of proposed hash function is no worse than SHA1.
  • Keywords
    cryptography; iterative methods; multi-threading; Merkle-Damgard construction; block-by-block message processing; hash function construction; incremental hash function; iterative hash function; parallel multithreaded programming; randomize-then-combine technique; Educational institutions; Message systems; Programming; Random access memory; Resistance; Vectors; Hash function implementation; incremental hash function; pair block chaining; randomize-then-combine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless and Optical Communication Conference (WOCC), 2014 23rd
  • Conference_Location
    Newark, NJ
  • Type

    conf

  • DOI
    10.1109/WOCC.2014.6839925
  • Filename
    6839925