Cryptology ePrint Archive: Report 2008/146
Abstract: In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It make the system can resistant against all extant attacks.
Category / Keywords: hash function, SHA, Dynamic SHA-2
Date: received 24 Mar 2008, last revised 25 May 2008
Contact author: xuzijiewz at gmail com
Available formats: PDF | BibTeX Citation
Note: Boolean and Arithmetic maybe different "face" of logical.
God bless people in calamity
Version: 20080525:122330 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]