Hash functions : analysis study /
While the some weaknesses have appeared in many hash functions such as MD4, MD5, RIPEMD-family and the series of Secure Hash Algorithm (SHA) families such as, SHA-0, SHA-1, SHA-2, with a number of SHA-3. Thus, National Institute of Standard and Technology (NIST) has suggested different principles to...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2013
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 037310000a22003490004500 | ||
---|---|---|---|
008 | 130313t2013 my a g m 000 0 eng d | ||
040 | |a UIAM |b eng | ||
041 | |a eng | ||
050 | 0 | 0 | |a QA76.9.A43 |
100 | 1 | |a AbdulMajeed, Khanssaa Munthir | |
245 | 1 | |a Hash functions : |b analysis study / |c by Khanssaa munthir Abdul Majeed | |
260 | |a Kuala Lumpur : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2013 | ||
300 | |a xiv, 94 leaves : |b ill. ; |c 30cm. | ||
500 | |a Abstracts in English and Arabic. | ||
500 | |a "A dissertation submitted in fulfilment of the requirement for the degree of Master of Information Systems."--On t.p. | ||
502 | |a Thesis (MIT)--International Islamic University Malaysia, 2013. | ||
504 | |a Includes bibliographical references (leaves 89-94). | ||
520 | |a While the some weaknesses have appeared in many hash functions such as MD4, MD5, RIPEMD-family and the series of Secure Hash Algorithm (SHA) families such as, SHA-0, SHA-1, SHA-2, with a number of SHA-3. Thus, National Institute of Standard and Technology (NIST) has suggested different principles to avoid the blunders, and to choice the ideal quality of hash function, that to be a measurement in future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, or the beginning of 2013. Therefore, for this reason the research addresses the comparative study of the finalist SHA-3 candidates in: design and structure, complexity, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). As a result, from this comprehensive comparison study between the finalist SHA-3 candidates such as; BLAKE, Grostl, JH, Keccak, and Skein, a choice can be made as to the ideal security algorithm against different attacks in suitable structure design of high utilizing of message distribution with high trade-off of speed/ area performance in low cost. Therefore main idea in this research is classify, comparison, and analysis for all five SHA-3 candidates of finalist, and studying the details of these five candidates that in Round 3 by using different structures and different design approaches, and identifying whether the complexity for each design. Thus, this research found a JH hash function is the faster in implementation followed by Grostl hash function, after that Keccak hash function, which gets best security of the hash function applications for different industry structures, as well as supporting a security of different size of data in computer science. | ||
596 | |a 1 | ||
650 | 0 | 0 | |a Algorithms |
650 | 0 | 0 | |a Data encryption (Computer science) |
650 | 0 | 0 | |a Computer |x Access control |
650 | 0 | 0 | |a Cryptography |
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Department of Information Systems |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Department of Information Systems | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/5402 |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. | |
900 | |a hab-ro-rose-naw | ||
999 | |c 435611 |c 435611 |d 470526 |d 470526 | ||
999 | |c 435611 |c 435611 |d 470526 |d 470526 | ||
952 | |0 0 |6 T QA 000076.9 A43 A136H 2013 |7 0 |8 THESES |9 758778 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t QA 76.9 A43 A136H 2013 |p 00011282816 |r 2017-10-20 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF QA 76.9 A43 A136H 2013 |7 0 |8 THESES |9 850571 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf QA 76.9 A43 A136H 2013 |p 00011282817 |r 2017-10-26 |t 1 |v 0.00 |y THESISDIG |