You are looking at a specific version 20080525:122330 of this paper. See the latest version.

Paper 2008/146

Dynamic SHA-2

Xu Zijie

Abstract

In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It make the system can resistant against all extant attacks.

Note: Boolean and Arithmetic maybe different "face" of logical. God bless people in calamity

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
hash functionSHADynamic SHA-2
Contact author(s)
xuzijiewz @ gmail com
History
2008-05-25: last of 3 revisions
2008-03-31: received
See all versions
Short URL
https://ia.cr/2008/146
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.