Title :
Cryptographic hash function Blue Midnight Wish
Author :
Gligoroski, Danilo ; Klima, Vlastimil ; Knapskog, Svein Johan ; El-Hadedy, Mohamed ; Amundsen, Jørn
Author_Institution :
Dept. of Telematics, Norwegian Univ. of Sceince & Technol., Trondheim, Norway
Abstract :
The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST). BLUE MIDNIGHT WISH is a cryptographic hash function with output size of n bits where n = 224, 256, 384 or 512. Its conjectured cryptographic security is: 0(2%) hash computations for finding collisions, O(2n) hash computations for finding preimages, O(2n-k) hash computations for finding second preimages for messages shorter than 2k bits. Additionally, it is resistant against length-extension attacks, and it is resistant against multicollision attacks. BLUE MIDNIGHT WISH has been designed to be much more efficient than SHA-2 cryptographic hash functions, while in the same time offering same or better security. The speed of the optimized 32-bit version on defined reference platform is 8.63 cycles/byte for n = 224, 256 and 12.72 cycles/byte for n = 384, 512. The speed of the optimized 64bit version on defined reference platform is 7.83 cycles/byte for n = 224, 256 and 4.06 cycles/byte for n = 384, 512.
Keywords :
computational complexity; cryptography; file organisation; National Institute of Standards and Technology; SHA-3 hash competition; conjectured cryptographic security; cryptographic hash function blue midnight wish; multicollision attacks; Cryptography; Logic functions; NIST; Resistance; Schedules; Transforms;
Conference_Titel :
Security and Communication Networks (IWSCN), 2009 Proceedings of the 1st International Workshop on
Conference_Location :
Trondheim
Print_ISBN :
978-1-61284-168-7
Electronic_ISBN :
978-82-997105-1-0