Cryptology ePrint Archive: Report 2008/146

Dynamic SHA-2

Xu Zijie

Abstract: In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It make the system can resistant against all extant attacks.

Category / Keywords: hash function, SHA, Dynamic SHA-2

Date: received 24 Mar 2008, last revised 25 May 2008

Contact author: xuzijiewz at gmail com

Available format(s): PDF | BibTeX Citation

Note: Boolean and Arithmetic maybe different "face" of logical.

God bless people in calamity

Version: 20080525:122330 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]