Presentation 2002/7/12
A Design of Cryptographic Hash Function Group with Variable Output-Length Based on SHA-1
Yong-Sork HER, Kouichi SAKURAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The cryptographic hash function provides the services of information security, authentication, integrity, non-reputation in a branch of information secret. A cryptographic hash function has been developed since MD4 was proposed by Rivest. In present, U.S standard of a hash function is SHA-1 with 160 bits of output length. It is difficult to be sure of a security of a hash function with 160 bits of output length. In this paper, we propose a hash function, namely SHA-V, with variable output-length based on SHA-1, HAVAL and HAS-V. The structure of SHA-V is two parallel lines, denoted as the Left-line and Right-line, consisting of 80 steps each and 3-variable 4 Boolean functions each line. The input length is 1024 bits and the output length is from 128 bits to 320 bits by 32-bit. SHA-V has the most advantage of SHA-1. That is, the message variable creates in combination with input message and step calculations. This new message variable provides the resistance against most of attacks that search the collision resistance by the fabricating of input messages. When we compare SHA-V and HAS-V in side of operation, SHA-V is 10% faster than HAS-V on a Pentium PC.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Cryptographic hash functions / Cryptography / SHA-1 / Collision resistance / MD-4 / HAVAL
Paper # ISEC2002-43
Date of Issue

Conference Information
Committee ISEC
Conference Date 2002/7/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Design of Cryptographic Hash Function Group with Variable Output-Length Based on SHA-1
Sub Title (in English)
Keyword(1) Cryptographic hash functions
Keyword(2) Cryptography
Keyword(3) SHA-1
Keyword(4) Collision resistance
Keyword(5) MD-4
Keyword(6) HAVAL
1st Author's Name Yong-Sork HER
1st Author's Affiliation Dept. of Computer Science and Communication Engineering, Kyushu University()
2nd Author's Name Kouichi SAKURAI
2nd Author's Affiliation Dept. of Computer Science and Communication Engineering, Kyushu University
Date 2002/7/12
Paper # ISEC2002-43
Volume (vol) vol.102
Number (no) 212
Page pp.pp.-
#Pages 8
Date of Issue