Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "2e6e3909-011a-4b10-9eec-8752337c2dc9"}, "_deposit": {"id": "3470", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3470"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3470", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Manipulation Detection Code (MDC-2)"}, {"interim": "Blow-Cast-Fish block cipher"}, {"interim": "compression function iterative processing"}, {"interim": "unkeyed hash function"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (26).pdf", "filesize": [{"value": "319 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 319000.0, "url": {"url": "https://meral.edu.mm/record/3470/files/psc2010paper (26).pdf"}, "version_id": "74d1e619-7318-45a2-b832-4305d8d954d3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth  Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, Mya Thet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1217"}, "item_title": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003470", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3470", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function

http://hdl.handle.net/20.500.12678/0000003470
http://hdl.handle.net/20.500.12678/0000003470
74e300ee-ce49-4d82-953a-555eb7c3d620
2e6e3909-011a-4b10-9eec-8752337c2dc9
None
Preview
Name / File License Actions
psc2010paper psc2010paper (26).pdf (319 Kb)
Publication type
Article
Upload type
Publication
Title
Title Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function
Language en
Publication date 2010-12-16
Authors
Khaing, Mya Thet
Aye, Zin May
Description
Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1).
Keywords
Manipulation Detection Code (MDC-2), Blow-Cast-Fish block cipher, compression function iterative processing, unkeyed hash function
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1217
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:00:05.105234
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL