Hash functions : analysis study /

While the some weaknesses have appeared in many hash functions such as MD4, MD5, RIPEMD-family and the series of Secure Hash Algorithm (SHA) families such as, SHA-0, SHA-1, SHA-2, with a number of SHA-3. Thus, National Institute of Standard and Technology (NIST) has suggested different principles to...

Full description

Saved in:
Bibliographic Details
Main Author: AbdulMajeed, Khanssaa Munthir
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2013
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 037310000a22003490004500
008 130313t2013 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
050 0 0 |a QA76.9.A43 
100 1 |a AbdulMajeed, Khanssaa Munthir  
245 1 |a Hash functions :  |b analysis study /  |c by Khanssaa munthir Abdul Majeed 
260 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,   |c 2013 
300 |a xiv, 94 leaves :  |b ill. ;  |c 30cm. 
500 |a Abstracts in English and Arabic. 
500 |a "A dissertation submitted in fulfilment of the requirement for the degree of Master of Information Systems."--On t.p. 
502 |a Thesis (MIT)--International Islamic University Malaysia, 2013. 
504 |a Includes bibliographical references (leaves 89-94). 
520 |a While the some weaknesses have appeared in many hash functions such as MD4, MD5, RIPEMD-family and the series of Secure Hash Algorithm (SHA) families such as, SHA-0, SHA-1, SHA-2, with a number of SHA-3. Thus, National Institute of Standard and Technology (NIST) has suggested different principles to avoid the blunders, and to choice the ideal quality of hash function, that to be a measurement in future of hash function generations. Therefore, the goal of the NIST contenders in SHA-3 between the hash functions is to be chosen as the winner in the end of 2012, or the beginning of 2013. Therefore, for this reason the research addresses the comparative study of the finalist SHA-3 candidates in: design and structure, complexity, with performance and cost, to measure the robustness of the algorithms through the Fundamentals Security Measurement Factors of Hash Function (FSMFHF) of Secure Hash Algorithm (SHA). As a result, from this comprehensive comparison study between the finalist SHA-3 candidates such as; BLAKE, Grostl, JH, Keccak, and Skein, a choice can be made as to the ideal security algorithm against different attacks in suitable structure design of high utilizing of message distribution with high trade-off of speed/ area performance in low cost. Therefore main idea in this research is classify, comparison, and analysis for all five SHA-3 candidates of finalist, and studying the details of these five candidates that in Round 3 by using different structures and different design approaches, and identifying whether the complexity for each design. Thus, this research found a JH hash function is the faster in implementation followed by Grostl hash function, after that Keccak hash function, which gets best security of the hash function applications for different industry structures, as well as supporting a security of different size of data in computer science. 
596 |a 1 
650 0 0 |a Algorithms  
650 0 0 |a Data encryption (Computer science) 
650 0 0 |a Computer  |x Access control 
650 0 0 |a Cryptography 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Information Systems  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Information Systems 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5402  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a hab-ro-rose-naw 
999 |c 435611  |c 435611  |d 470526  |d 470526 
999 |c 435611  |c 435611  |d 470526  |d 470526 
952 |0 0  |6 T QA 000076.9 A43 A136H 2013  |7 0  |8 THESES  |9 758778  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t QA 76.9 A43 A136H 2013  |p 00011282816  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF QA 76.9 A43 A136H 2013  |7 0  |8 THESES  |9 850571  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf QA 76.9 A43 A136H 2013  |p 00011282817  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG