-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "2e6e3909-011a-4b10-9eec-8752337c2dc9"}, "_deposit": {"id": "3470", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3470"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3470", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Manipulation Detection Code (MDC-2)"}, {"interim": "Blow-Cast-Fish block cipher"}, {"interim": "compression function iterative processing"}, {"interim": "unkeyed hash function"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (26).pdf", "filesize": [{"value": "319 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 319000.0, "url": {"url": "https://meral.edu.mm/record/3470/files/psc2010paper (26).pdf"}, "version_id": "74d1e619-7318-45a2-b832-4305d8d954d3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khaing, Mya Thet"}, {"subitem_authors_fullname": "Aye, Zin May"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1217"}, "item_title": "Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003470", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3470", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function"], "weko_shared_id": -1}
Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function
http://hdl.handle.net/20.500.12678/0000003470
http://hdl.handle.net/20.500.12678/000000347074e300ee-ce49-4d82-953a-555eb7c3d620
2e6e3909-011a-4b10-9eec-8752337c2dc9
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Implementation of Hash Function using Blow-CAST-Fish Algorithm in MDC-2 Compression Function | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Khaing, Mya Thet | ||||||
Aye, Zin May | ||||||
Description | ||||||
Hash functions are one-way mathematical algorithms and produce a fixed length output string. The most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. In this system MDC-2 algorithm is used to generate a compression function with a Blow-Cast-Fish block cipher. MDC-2 generates double block length and concatenated them to have the same input block length at output. MDC-2 is an unkeyed hash function. Blow-Cast-Fish is a block cipher, combination of Blowfish and Cast algorithm. In the implementation of hash function it generally consists of preprocessing, iterative processing. The output transformation is added with these general processings to achieve the optional output. MDC-2 is used in the iterated processing and Blow-Cast-Fish is used as a part in MDC-2 compression function. The result hash value from MDC-2 is compressed in the function to yield 256 fixed block length. This is again compressed in the optional function to have 128 bit hash codes. As the result, the time analysis for computing hash value of this system is compared with other hash functions (MD5 and SHA-1). | ||||||
Keywords | ||||||
Manipulation Detection Code (MDC-2), Blow-Cast-Fish block cipher, compression function iterative processing, unkeyed hash function | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1217 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |