Cryptology ePrint Archive: Report 2007/476
Abstract: In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design components from the SHA-2 family, but there is function R in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, different rotate right operation maybe done. It make the system can resistant against all extant attacks.
Category / Keywords: hash function, SHA, Dynamic SHA
Date: received 17 Dec 2007, last revised 20 Nov 2008
Contact author: xuzijiewz at gmail com
Available format(s): PDF | BibTeX Citation
Note: I found D-sha is weak, if it is constituted with three same and easy backward part. I had found it at 2007/08. I revise it now. It is luck that d-sha2 is not like this, it just not so good as it can without constants.
Version: 20081120:132540 (All versions of this report)
Short URL: ia.cr/2007/476
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]