CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analysis of the Hash Function – Modified Grøstl

by Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 21
Year of Publication: 2012
Authors: Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal
10.5120/6399-8918

Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal . Analysis of the Hash Function – Modified Grøstl. International Journal of Computer Applications. 44, 21 ( April 2012), 50-55. DOI=10.5120/6399-8918

@article{ 10.5120/6399-8918,
author = { Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S K Pal },
title = { Analysis of the Hash Function – Modified Grøstl },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 21 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 50-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number21/6399-8918/ },
doi = { 10.5120/6399-8918 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:36:11.938336+05:30
%A Gurpreet Kaur
%A Vidyavati S Nayak
%A Dhananjoy Dey
%A S K Pal
%T Analysis of the Hash Function – Modified Grøstl
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 21
%P 50-55
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modified Grøstl - mGrøstl hash function was recently proposed by the authors as an alternative of one of the five finalist of SHA-3 competition namely Grøstl-256. This research paper presents the detailed analysis of algorithm along with performance evaluation of mGrøstl in eBASH project. According to the analysis, paper points out that different performance can be gained by adapting different platform.

References
  1. A. Menezes, P. Oorschot & S. Vanstone, 1997, Handbook of Applied Cryptography. CRC Press http://www. cacr. math. uwateroo. ca/hac/
  2. E. Biham and R. Chen, "Near-collisions of SHA-0," in Advances in Cryptology—CRYPTO 2004, Lecture Notes in Computer Science, M. K. Franklin, Ed. Berlin, Germany: Springer-Verlag, 2004, vol. 3152, pp. 290–305.
  3. National Institute of Standards and Technology, 2011, Cryptographic Hash Project SHA-3 contest, http://csrc. nist. gov/groups/ST/hash/sha-3/index. html.
  4. J. P. Aumasson, L. Henzen, W. Meier, R. Phan, 2011, SHA-3 Proposal Blake. Candidate to the NIST Hash Competition.
  5. P. Gauravaram, L. Knudsen, K. Matusiewicz, F. Mendel, 2011, C. Rechberger, M. Schlaffer, and S. Thomsen: Grøstl - a SHA-3 candidate. Submission to NIST http://groestl. info.
  6. H. Wu, 2011, JH. Candidate to the NIST Hash Competition.
  7. G. Bertoni, J. Daemen, M. Peeters , G. Assche, 2011, Keccak. Candidate to the NIST Hash Competition.
  8. N. Ferguson, S. Lucks, B. Schneier, D. Whiting, M. Bellare, T. Kohno, J. Callas, J. Walker, 2008, Skein. Candidate to the NIST Hash Competition.
  9. D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench. cr. yp. to, accessed 1 Feb 2012.
  10. Gurpreet Kaur, Vidyavati S Nayak, Dhananjoy Dey, S. K. Pal, "Modified Grøstl: An Efficient Hash Function", (Accepted In proceeding) CSIA2012, Advances in Intelligent and Soft Computing book Series, Springer.
  11. D. Karras & V. Zorkadis, "A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Application". IEEE 2000
  12. R. Chatterjee, M. A. Saifee, and D. RoyChowdhury, "Modifications of SHA-0 to Prevent Attacks," in S. Jajodia and C. Mazumdar (Eds. ) ICISS 2005, LNCS 3803, Springer-Verlag Berlin Heidelberg 2005, pp. 277–289, 2005.
  13. D. J. Bernstein and T. Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench. cr. yp. to/impl-hash/mgrostl256. html accessed 3 Mar 2012.
  14. D. J. Bernstein and T. Lange, 2012, The new SHA-3 software shootout. http://eprint. iacr. org/2012/004. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Ebash Entropy Test Grøstl Hash Function Mgrøstl Sha3 Competition.