DIKUL - logo
(UM)
  • Funkcija Keccak SHA-3 zmagovalec = Function Keccak the SHA-3 Winner
    Verdonik, Ivan ; Novak, Bojan, računalničar
    Cryptographic hash functions are very important elements in contemporary cryptography. Their most important usage is manipulation detection during datatransfer. Main construction method for these ... functions is still old Merkle-Damgard construction. However, there are improvements like HAIFA and also sponge functions. For transforming arbitrary long messages into fixed size output, compression functions are used. The most known are Davies-Meyer, Matyas-Meyer- Oseas and Miyaguchi-Preneel. Cryptographic hash functions must mandatory resist at least to collision, pre-image and secondary pre-image attacks. Function Keccak (based on sponge construction) is SHA-3 competition winner. Competition was announced because the most widely used cryptographic hash functions (SHA-1, MD5) are vulnerable (especially MD5 - collision) and SHA-2 is constructed similarly to SHA-1. But nowSHA-2 was found to be strongerthan it was thought and so Keccak (SHA-3) is the reserve at the moment. 1
    Vrsta gradiva - prispevek na konferenci
    Leto - 2013
    Jezik - slovenski
    COBISS.SI-ID - 17172758