📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 9, ISSUE 12, DECEMBER 2020

An Effective Cryptanalysis using Hash Functions

Dr. Jasmin B. Parmar, Dr. Pratik A. Vanjara

DOI: 10.17148/IJARCCE.2020.91207

Abstract: (Naya-Plasencia et al., 2010)The ESSENCE group of CHFs, planned by Martin, was a Round 1 competitor in the SHA-3 rivalry. It is a group of square code based CHFs utilizing the Merkle Damg'ard method of activity. The ESSENCE family employments basic calculations that are effectively parallelizable and entrenched numerical standards. Quintessence accompanies a proof of protection from direct and differential cryptanalysis that until this work stayed unchallenged. In this paper, we first depict a few undesired properties of the ESSENCE L capacity. These can be utilized to fabricate a sans semi beginning crash assault on 31 out of 32 rounds of the ESSENCE-512 pressure work utilizing a differential trademark. (Knopf, 2007; Naya-Plasencia et al., 2010)This straightforwardly refutes the plan guarantee that 24 rounds of ESSENCE make it impervious to differential cryptanalysis. To fabricate our assault, we depict a novel procedure to fulfill the conditions forced by the trademark in the first nine rounds. We don't know about a comparative procedure in existing writing.

How to Cite:

[1] Dr. Jasmin B. Parmar, Dr. Pratik A. Vanjara, “An Effective Cryptanalysis using Hash Functions,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2020.91207