Index Link

  • RootNode

Item

{"_buckets": {"deposit": "2e6e3909-011a-4b10-9eec-8752337c2dc9"}, "_deposit": {"id": "3470", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3470"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3470", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Manipulation Detection Code (MDC-2)"}, {"interim": "Blow-Cast-Fish block cipher"}, {"interim": "compression function iterative processing"}, {"interim": "unkeyed hash function"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (26).pdf", "filesize": [{"value": "319 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 319000.0, "url": {"url": "https://meral.edu.mm/record/3470/files/psc2010paper (26).pdf"}, "version_id": "74d1e619-7318-45a2-b832-4305d8d954d3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth  Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, Mya Thet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1217"}, "item_title": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003470", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3470", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function"], "weko_shared_id": -1}

Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function

http://hdl.handle.net/20.500.12678/0000003470
74e300ee-ce49-4d82-953a-555eb7c3d620
2e6e3909-011a-4b10-9eec-8752337c2dc9
None
Name / File License Actions
psc2010paper psc2010paper (26).pdf (319 Kb)
Publication type
Article
Upload type
Publication
Title
Title Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function
Language en
Publication date 2010-12-16
Authors
Khaing, Mya Thet
Aye, Zin May
Description
Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1).
Keywords
Manipulation Detection Code (MDC-2), Blow-Cast-Fish block cipher, compression function iterative processing, unkeyed hash function
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1217
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats