2013 International Conference on Communication Systems and Network Technologies 2013
DOI: 10.1109/csnt.2013.42
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced SHA-192 Algorithm with Larger Bit Difference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…This problem will lead to the possibility of having two different input that will yield the same output value in the middle of algorithm or compression function [20] [28]. Therefore, it is necessary to design a function with better diffusion to spread the output in each round and prevent the same output in the next coming stages [20], [29]- [30].…”
Section: Introductionmentioning
confidence: 99%
“…This problem will lead to the possibility of having two different input that will yield the same output value in the middle of algorithm or compression function [20] [28]. Therefore, it is necessary to design a function with better diffusion to spread the output in each round and prevent the same output in the next coming stages [20], [29]- [30].…”
Section: Introductionmentioning
confidence: 99%
“…This problem will lead to the chance of having two different input that will generate the same output value in the middle of algorithm or compression function [30], [31]. Hence, there is a need to devise a function with improved diffusion to distribute the output in each round and prevent the same in the next coming stages [32], [33], [30].…”
Section: Introductionmentioning
confidence: 99%
“…Some studies made proposed enhancements on SHA-1 aimed to attain additional diffusion [34], [35] but did not show the bit-difference on the simulation of result or have shown lower bit difference. Another incorporated MD5 to SHA-1 [32], but this approach will suffer from the same vulnerability [36], [37]. Another study has not included actual messages used during the experiment [38].…”
Section: Introductionmentioning
confidence: 99%
“…In [1], Authors have merged the SHA-192 and MD-5 and proposed their own algorithm. This algorithm also generates a digest of 192 bits.…”
Section: Introductionmentioning
confidence: 99%
“…It should be infeasible to find two different messages with the same hash. [1,10] There are many cryptographic hash algorithms: MD4, MD5, SHA-0, SHA-1 and SHA-2, but all these algorithms are either not secure or not efficient in terms of time. Hash algorithm uses a message and generates a message digest of fixed length.…”
Section: Introductionmentioning
confidence: 99%