A group of functions used in the development of Khichidi-1 is described, followed by a detailed explanation of preprocessing approach. Differences between Khichidi-1 and NIST SHA-2, the algorithm that is in use widely, have also been highlighted. Analytical proofs, implementations with examples, various attack scenarios, entropy tests, security strength and computational complexity of the algorithm are described as separate sections in this document.
Category / Keywords: implementation / Secure hash algorithms, One-way function, LFSR Publication Info: SHA$-$3 Date: received 8 Dec 2008, last revised 11 Dec 2008, withdrawn 2 Jan 2009 Contact author: n vijayarangan at tcs com Available format(s): (-- withdrawn --) Version: 20090102:081032 (All versions of this report) Short URL: ia.cr/2008/518 Discussion forum: Show discussion | Start new discussion