Explore chapters and articles related to this topic
Very-Large-Scale Integration Implementations of Cryptographic Algorithms
Published in Tomasz Wojcicki, Krzysztof Iniewski, VLSI: Circuits for Emerging Applications, 2017
In 2007, the U.S. NIST announced a public competition aiming at the selection of a new cryptographic hash function standard [22]. The motivation behind the NIST competition was to replace the two widely used hash functions MD5 and SHA-1 following a series of successful attacks [23,24,25] on them. On October 2, 2012, Keccak designed by Guido Bertoni, Joan Daemen, Michal Peeters, and Gilles Van Assche was selected as the winner of the SHA-3 hash function competition. Several applications, such as multigigabit mass storage devices and radio-frequency identification (RFID) tags, are expected to utilize SHA-3. SHA-3 hash function finds application in both high-performance and resource-constrained environments and offers good performance in terms of speed, area, and power.
Cryptographic Foundations of Blockchain Technology
Published in Rajdeep Chakraborty, Anupam Ghosh, Valentina Emilia Bălaş, Ahmed A Elngar, Blockchain, 2023
Although SHA-2 is not broken, its predecessors SHA-1, MD5, and MD4 are broken. For this reason, NIST (National Institute of Standards and Technology) announced a SHA-3 Competition that took place between 2007 and 2012. This competition received 64 submissions and the winner KECCAK became SHA-3. Its message digest sizes are the same as SHA-2 to allow transition from SHA-2 to SHA-3 if necessary. The block sizes are 1,152, 1,088, 832, and 576 bits corresponding to 224-, 256-, 384-, and 512-bit message digest sizes. The number of rounds is 64 or 80. Unlike SHA-2, SHA-3 is a sponge construction. Sponge functions have relatively larger internal states and a permutation modifies this internal state at each step. A small part of the state is used for producing output.
A Novel LC-DEH Algorithm to Enhance Efficiency and Security for Reliable Data Transmission in Blockchain with IoT-Based Healthcare Systems
Published in Ambikapathy, R. Shobana, Logavani, Dharmasa, Reinvention of Health Applications with IoT, 2022
G. Uganya, Radhika Baskar, M. Balasaraswathi, N. Vijayaraj, D. Rajalakshmi
SHA3-224: SHA-3 is the latest SHA released by the National Institute of Standards and Technology (NIST). The main purpose of SHA-3 is that it can be substituted directly for SHA-2 in the case of present applications and also to improve the robustness of NIST. For SHA3-224, the output size d is 224. Its capacity is 448. The rate of SHA3-224 is equal to block size i.e., 1600-c, which is exactly 1152. A single instance of SHA3-224 function processes input messages at 303.58 MHz.
A secure hash function based on feedback iterative structure
Published in Enterprise Information Systems, 2019
Yijun Yang, Fei Chen, Jianyong Chen, Yong Zhang, Kai Leung Yung
On the other hand, serial hash functions should compress all message blocks one by one. The relationship among outputs of every compression functions is hereditary, which is beneficial to message diffusion effect. The most popular hash types currently in use are message digest algorithms (such as MD4, MD5) and secure hash algorithms (such as SHA1, SHA2). It is well known that MD4, MD5, SHA1 and SHA2 (including SHA224, SHA256, SHA384, SHA512) suffer from some common attacks because their similar iterative structure (Wang, Yin, and Yu 2005, Boer and Bosselaers 1994, Dobbertin date unknown, Chabaud and Joux 1998, Liang and Lai 2005, Mendel, Nad, and Schlaffer 2013, Sasaki et al. 2007, Stevens 2013, Wang et al. 2004). SHA3 (Keccak) uses sponge iterative structure which is the latest hash function announced by NIST (Bertoni, Daeman, and Peeters n.d). Although SHA3 can resist the above attacks, its vulnerability has been found by the third party cryptanalysis (Bertoni, Daeman, and Peeters n.d).