Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/24001
DC FieldValueLanguage
dc.contributor.authorGligoroski, Daniloen_US
dc.contributor.authorSteinsmo Ødegård, Runeen_US
dc.contributor.authorMihova, Marijaen_US
dc.contributor.authorJohan Knapskog, Sveinen_US
dc.contributor.authorDrápal, Aleshen_US
dc.contributor.authorKlima, Vlastimilen_US
dc.contributor.authorAmundse, Jørnen_US
dc.contributor.authorEl-Hadedy, Mohameden_US
dc.date.accessioned2022-10-31T13:15:44Z-
dc.date.available2022-10-31T13:15:44Z-
dc.date.issued2009-05-20-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/24001-
dc.description.abstractIn this paper we describe in details the tweaked cryptographic hash function EDON-ℛ that we denote as EDONℛ′ . EDON-ℛ was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST). The difference between originally submitted version of EDON-ℛ and version EDON-ℛ′ is in the added feedback to the original compression function ℛ. The feedback consist of xoring the output of the function ℛ with the previous double pipe value and the value of the current message block. Now, EDON-ℛ′ can be seen as a double-pipe PGV7 hash scheme. The introduced tweak does not invalidates the cryptanalytic efforts to analyze the quasigroup operations used in EDON-ℛ′ , as well as its function ℛ. It also does not affect much the speed of the function. However, this tweak prevents finding free-start collisions and prevents all attacks based on free-start collisions. EDON-ℛ′ is a cryptographic hash function with output size of 𝑛 bits where 𝑛 = 224, 256, 384 or 512. Its conjectured cryptographic security is: 𝑂(2 𝑛 2 ) hash computations for finding collisions, 𝑂(2𝑛) hash computations for finding preimages, 𝑂(2𝑛−𝑘) hash computations for finding second preimages for messages shorter than 2𝑘 bits. Additionally, it is resistant against length-extension attacks, resistant against multicollision attacks and it is provably resistant against differential cryptanalysis. EDON-ℛ′ performance has been measured with Microsoft Visual Studio 2005, and with Intel C++ v 11.0.072. EDON-ℛ′ has been designed to be much more efficient than SHA-2 cryptographic hash functions, while in the same time offering same or better security. The speed of the optimized 32-bit version on defined reference platform with Intel C++ v 11.0.072 is 6.71 cycles/byte for 𝑛 = 224, 256 and 10.74 cycles/byte for 𝑛 = 384, 512. The speed of the optimized 64-bit version on defined reference platform with Intel C++ v 11.0.072 is 4.90 cycles/byte for 𝑛 = 224, 256 and 2.74 cycles/byte for 𝑛 = 384, 512.en_US
dc.publisherIEEEen_US
dc.titleCryptographic hash function Edon-R′en_US
dc.typeProceedingsen_US
dc.relation.conference2009 Proceedings of the 1st International Workshop on Security and Communication Networksen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
05683046.pdf326.12 kBAdobe PDFView/Open
Show simple item record

Page view(s)

47
checked on May 3, 2025

Download(s)

54
checked on May 3, 2025

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.