You are looking at a specific version 20080525:122330 of this paper.
See the latest version.
Paper 2008/146
Dynamic SHA-2
Xu Zijie
Abstract
In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It make the system can resistant against all extant attacks.
Note: Boolean and Arithmetic maybe different "face" of logical. God bless people in calamity
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- hash functionSHADynamic SHA-2
- Contact author(s)
- xuzijiewz @ gmail com
- History
- 2008-05-25: last of 3 revisions
- 2008-03-31: received
- See all versions
- Short URL
- https://ia.cr/2008/146
- License
-
CC BY