Omega network hash construction
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash v...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uthm-ep.3706 |
---|---|
record_format |
uketd_dc |
spelling |
my-uthm-ep.37062022-02-03T01:59:03Z Omega network hash construction 2009-11 Chuah, Chai Wen QA76 Computer software Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash value. The basic Merkle-Damgard construction runs over the input sequentially, which can lead to problems when the input size is large since the computation time increases linearly. Therefore, an alternative architecture which can reduce the computation time is needed, especially in today's world where multi-core processors and multithreaded programming are common. An Omega Network Hash Construction that can run parallel on multi-core machine has been proposed as alternative hash function's construction. The Omega Network Hash Construction performs better than the Merkle-Damgard construction, and its permutation architecture shows that its security level in term of producing randomness digest value is better than Merkle-Damgard construction. 2009-11 Thesis http://eprints.uthm.edu.my/3706/ http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf text en public mphil masters Universiti Sains Malaysia School of Science Computer |
institution |
Universiti Tun Hussein Onn Malaysia |
collection |
UTHM Institutional Repository |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Chuah, Chai Wen Omega network hash construction |
description |
Cryptographic hash functions are very common and important cryptographic primitives.
They are commonly used for data integrity checking and data authentication. Their
architecture is based on the Merkle-Damgard construction, which takes in a variablelength
input and produces a fixed-length hash value. The basic Merkle-Damgard
construction runs over the input sequentially, which can lead to problems when the input
size is large since the computation time increases linearly. Therefore, an alternative
architecture which can reduce the computation time is needed, especially in today's
world where multi-core processors and multithreaded programming are common. An
Omega Network Hash Construction that can run parallel on multi-core machine has been
proposed as alternative hash function's construction. The Omega Network Hash
Construction performs better than the Merkle-Damgard construction, and its permutation
architecture shows that its security level in term of producing randomness digest value is
better than Merkle-Damgard construction. |
format |
Thesis |
qualification_name |
Master of Philosophy (M.Phil.) |
qualification_level |
Master's degree |
author |
Chuah, Chai Wen |
author_facet |
Chuah, Chai Wen |
author_sort |
Chuah, Chai Wen |
title |
Omega network hash construction |
title_short |
Omega network hash construction |
title_full |
Omega network hash construction |
title_fullStr |
Omega network hash construction |
title_full_unstemmed |
Omega network hash construction |
title_sort |
omega network hash construction |
granting_institution |
Universiti Sains Malaysia |
granting_department |
School of Science Computer |
publishDate |
2009 |
url |
http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf |
_version_ |
1747831040003538944 |