Research Article

Analysis of the Hash Function – Modified Grøstl

by  Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Issue 21
Published: April 2012
Authors: Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal
10.5120/6399-8918
PDF

Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal . Analysis of the Hash Function – Modified Grøstl. International Journal of Computer Applications. 44, 21 (April 2012), 50-55. DOI=10.5120/6399-8918

                        @article{ 10.5120/6399-8918,
                        author  = { Gurpreet Kaur,Vidyavati S Nayak,Dhananjoy Dey,S K Pal },
                        title   = { Analysis of the Hash Function – Modified Grøstl },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 44 },
                        number  = { 21 },
                        pages   = { 50-55 },
                        doi     = { 10.5120/6399-8918 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Gurpreet Kaur
                        %A Vidyavati S Nayak
                        %A Dhananjoy Dey
                        %A S K Pal
                        %T Analysis of the Hash Function – Modified Grøstl%T 
                        %J International Journal of Computer Applications
                        %V 44
                        %N 21
                        %P 50-55
                        %R 10.5120/6399-8918
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Modified Grøstl - mGrøstl hash function was recently proposed by the authors as an alternative of one of the five finalist of SHA-3 competition namely Grøstl-256. This research paper presents the detailed analysis of algorithm along with performance evaluation of mGrøstl in eBASH project. According to the analysis, paper points out that different performance can be gained by adapting different platform.

References
  • A. Menezes, P. Oorschot & S. Vanstone, 1997, Handbook of Applied Cryptography. CRC Press http://www. cacr. math. uwateroo. ca/hac/
  • E. Biham and R. Chen, "Near-collisions of SHA-0," in Advances in Cryptology—CRYPTO 2004, Lecture Notes in Computer Science, M. K. Franklin, Ed. Berlin, Germany: Springer-Verlag, 2004, vol. 3152, pp. 290–305.
  • National Institute of Standards and Technology, 2011, Cryptographic Hash Project SHA-3 contest, http://csrc. nist. gov/groups/ST/hash/sha-3/index. html.
  • J. P. Aumasson, L. Henzen, W. Meier, R. Phan, 2011, SHA-3 Proposal Blake. Candidate to the NIST Hash Competition.
  • P. Gauravaram, L. Knudsen, K. Matusiewicz, F. Mendel, 2011, C. Rechberger, M. Schlaffer, and S. Thomsen: Grøstl - a SHA-3 candidate. Submission to NIST http://groestl. info.
  • H. Wu, 2011, JH. Candidate to the NIST Hash Competition.
  • G. Bertoni, J. Daemen, M. Peeters , G. Assche, 2011, Keccak. Candidate to the NIST Hash Competition.
  • N. Ferguson, S. Lucks, B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, J. Walker, 2008, Skein. Candidate to the NIST Hash Competition.
  • D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench. cr. yp. to, accessed 1 Feb 2012.
  • Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S. K. Pal, "Modified Grøstl: An Efficient Hash Function", (Accepted In proceeding) CSIA2012, Advances in Intelligent and Soft Computing book Series, Springer.
  • D. Karras & V. Zorkadis, "A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Application". IEEE 2000
  • R. Chatterjee, M. A. Saifee, and D. RoyChowdhury, "Modifications of SHA-0 to Prevent Attacks," in S. Jajodia and C. Mazumdar (Eds. ) ICISS 2005, LNCS 3803, Springer-Verlag Berlin Heidelberg 2005, pp. 277–289, 2005.
  • D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench. cr. yp. to/impl-hash/mgrostl256. html accessed 3 Mar 2012.
  • D. J. Bernstein and T. Lange, 2012, The new SHA-3 software shootout. http://eprint. iacr. org/2012/004. pdf
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ebash Entropy Test Grøstl Hash Function Mgrøstl Sha3 Competition.

Powered by PhDFocusTM