MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "2e6e3909-011a-4b10-9eec-8752337c2dc9"}, "_deposit": {"id": "3470", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3470"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3470", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Manipulation Detection Code (MDC-2)"}, {"interim": "Blow-Cast-Fish block cipher"}, {"interim": "compression function iterative processing"}, {"interim": "unkeyed hash function"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (26).pdf", "filesize": [{"value": "319 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 319000.0, "url": {"url": "https://meral.edu.mm/record/3470/files/psc2010paper (26).pdf"}, "version_id": "74d1e619-7318-45a2-b832-4305d8d954d3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, Mya Thet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1217"}, "item_title": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003470", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3470", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function"], "weko_shared_id": -1}
Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function
http://hdl.handle.net/20.500.12678/0000003470
http://hdl.handle.net/20.500.12678/000000347074e300ee-ce49-4d82-953a-555eb7c3d620
2e6e3909-011a-4b10-9eec-8752337c2dc9
Name / File | License | Actions |
---|---|---|
psc2010paper (26).pdf (319 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Khaing, Mya Thet | ||||||
Aye, Zin May | ||||||
Description | ||||||
Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1). | ||||||
Keywords | ||||||
Manipulation Detection Code (MDC-2), Blow-Cast-Fish block cipher, compression function iterative processing, unkeyed hash function | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1217 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |