Subscribe Now Subscribe Today
Science Alert
Curve Top
Journal of Applied Sciences
  Year: 2012 | Volume: 12 | Issue: 15 | Page No.: 1526-1536
DOI: 10.3923/jas.2012.1526.1536
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

STITCH-256: A Dedicated Cryptographic Hash Function

Norziana Jamil, Ramlan Mahmod, Muhammad Reza Z`aba, Nur Izura Udzir and Zuriati Ahmad Zukarnain

Hash functions are an important cryptographic primitive in a wide range of applications, such as message authentication and digital signatures. Among others, Message Digest (MD)-4/5, Secure Hashing Algorithm (SHA)-0/1/2 and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples of widely used hash functions in cryptographic applications. However with the advances of cryptanalysis, MD-4/5, SHA-0/1 and RIPEMD were broken in 2004-2005 after more than a decade of use. Since then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. This study describes a 256-bit hash function named as STITCH-256, to overcome problems found in MD- and SHA-family hash functions. We analyze all the components of STITCH-256 and the security analysis of STITCH-256 shows that it is not feasible to construct a collision path for STITCH-256 with a high probability of success.
PDF Fulltext XML References Citation Report Citation
  •    Fuzzy Cellular Automata Based Random Numbers Generation
  •    Innovative Approach to Generate Uniform Random Numbers Based on a Novel Cellular Automata
  •    Two-layer Cellular Automata Based Cryptography
How to cite this article:

Norziana Jamil, Ramlan Mahmod, Muhammad Reza Z`aba, Nur Izura Udzir and Zuriati Ahmad Zukarnain, 2012. STITCH-256: A Dedicated Cryptographic Hash Function. Journal of Applied Sciences, 12: 1526-1536.

DOI: 10.3923/jas.2012.1526.1536






Curve Bottom