STITCH-256: A dedicated cryptographic hash function

Norziana Jamil, Ramlan Mahmod, Muhammad Reza Z'aba, Nur Izura Udzir, Zuriati Ahmad Zukarnain

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success.

Original languageEnglish
Pages (from-to)1526-1536
Number of pages11
JournalJournal of Applied Sciences
Volume12
Issue number15
DOIs
Publication statusPublished - 19 Sep 2012

Fingerprint

Hash functions
Electronic document identification systems
Authentication

All Science Journal Classification (ASJC) codes

  • General

Cite this

Jamil, N., Mahmod, R., Z'aba, M. R., Udzir, N. I., & Zukarnain, Z. A. (2012). STITCH-256: A dedicated cryptographic hash function. Journal of Applied Sciences, 12(15), 1526-1536. https://doi.org/10.3923/jas.2012.1526.1536
Jamil, Norziana ; Mahmod, Ramlan ; Z'aba, Muhammad Reza ; Udzir, Nur Izura ; Zukarnain, Zuriati Ahmad. / STITCH-256 : A dedicated cryptographic hash function. In: Journal of Applied Sciences. 2012 ; Vol. 12, No. 15. pp. 1526-1536.
@article{65caa42fa4b947da98ea85af8cd550c5,
title = "STITCH-256: A dedicated cryptographic hash function",
abstract = "Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success.",
author = "Norziana Jamil and Ramlan Mahmod and Z'aba, {Muhammad Reza} and Udzir, {Nur Izura} and Zukarnain, {Zuriati Ahmad}",
year = "2012",
month = "9",
day = "19",
doi = "10.3923/jas.2012.1526.1536",
language = "English",
volume = "12",
pages = "1526--1536",
journal = "Journal of Applied Sciences",
issn = "1812-5654",
publisher = "Asian Network for Scientific Information",
number = "15",

}

Jamil, N, Mahmod, R, Z'aba, MR, Udzir, NI & Zukarnain, ZA 2012, 'STITCH-256: A dedicated cryptographic hash function', Journal of Applied Sciences, vol. 12, no. 15, pp. 1526-1536. https://doi.org/10.3923/jas.2012.1526.1536

STITCH-256 : A dedicated cryptographic hash function. / Jamil, Norziana; Mahmod, Ramlan; Z'aba, Muhammad Reza; Udzir, Nur Izura; Zukarnain, Zuriati Ahmad.

In: Journal of Applied Sciences, Vol. 12, No. 15, 19.09.2012, p. 1526-1536.

Research output: Contribution to journalArticle

TY - JOUR

T1 - STITCH-256

T2 - A dedicated cryptographic hash function

AU - Jamil, Norziana

AU - Mahmod, Ramlan

AU - Z'aba, Muhammad Reza

AU - Udzir, Nur Izura

AU - Zukarnain, Zuriati Ahmad

PY - 2012/9/19

Y1 - 2012/9/19

N2 - Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success.

AB - Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functiom in cryptographic applicatiom. However with the advances of cryptanalysis, MD-415, SHA-011 andRIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographc hash functiom have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash functionnamed as STITCH- 256, to overcome problems found inMD- and SHA-family hash functions. We analyze all the components of STITCH-256 andthe security analysis of STITCH-256 shows that it is not feasible to comtruct a collision path for STITCH-256 with a high probability of success.

UR - http://www.scopus.com/inward/record.url?scp=84866237765&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84866237765&partnerID=8YFLogxK

U2 - 10.3923/jas.2012.1526.1536

DO - 10.3923/jas.2012.1526.1536

M3 - Article

AN - SCOPUS:84866237765

VL - 12

SP - 1526

EP - 1536

JO - Journal of Applied Sciences

JF - Journal of Applied Sciences

SN - 1812-5654

IS - 15

ER -