Paper 2008/146
Dynamic SHA-2
Xu Zijie
Abstract
In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It make the system can resistant against all extant attacks.
Note: Boolean and Arithmetic maybe different "face" of logical. God bless people in calamity
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- hash functionSHADynamic SHA-2
- Contact author(s)
- xuzijiewz @ gmail com
- History
- 2008-05-25: last of 3 revisions
- 2008-03-31: received
- See all versions
- Short URL
- https://ia.cr/2008/146
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/146, author = {Xu Zijie}, title = {Dynamic {SHA}-2}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/146}, year = {2008}, url = {https://eprint.iacr.org/2008/146} }