Paper 2008/146

Dynamic SHA-2

Xu Zijie

Abstract

In this paper I describe the construction of Dynamic SHA-2 family of cryptographic hash functions. They are built with design components from the SHA-2 family, but I use the bits in message as parameters of function G, R and ROTR operation in the new hash functionh. It enabled us to achieve a novel design principle: When message is changed, the calculation will be different. It make the system can resistant against all extant attacks.

Note: Boolean and Arithmetic maybe different "face" of logical. God bless people in calamity

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
hash functionSHADynamic SHA-2
Contact author(s)
xuzijiewz @ gmail com
History
2008-05-25: last of 3 revisions
2008-03-31: received
See all versions
Short URL
https://ia.cr/2008/146
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/146,
      author = {Xu Zijie},
      title = {Dynamic SHA-2},
      howpublished = {Cryptology ePrint Archive, Paper 2008/146},
      year = {2008},
      note = {\url{https://eprint.iacr.org/2008/146}},
      url = {https://eprint.iacr.org/2008/146}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.