- Title
- Sha-1 and the strict avalanche criterion
- Creator
- Motara, Yusuf, M
- Creator
- Irwin, Barry V W
- Date Issued
- 2016
- Date
- 2016
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/429010
- Identifier
- vital:72553
- Identifier
- https://ieeexplore.ieee.org/abstract/document/7802926
- Description
- The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the degree to which compression function of the SHA-1 hash meets the SAC. The results (P 0.01) are heartening: SHA-1 closely tracks the SAC after the first 24 rounds, and demonstrates excellent properties of confusion and diffusion throughout.
- Format
- 5 pages
- Format
- Language
- English
- Relation
- Information security for South Africa (ISSA)
- Relation
- Motara, Y.M. and Irwin, B., 2016, August. Sha-1 and the strict avalanche criterion. In 2016 Information security for South Africa (ISSA) (pp. 35-40). IEEE
- Relation
- Information security for South Africa (ISSA) volume 2016 number 1 35 40 2016 Conference
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the IEEE Xplore Terms of Use Statement (https://ieeexplore.ieee.org/Xplorehelp/overview-of-ieee-xplore/terms-of-use)
- Hits: 79
- Visitors: 79
- Downloads: 6
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | Sha-1 and the strict avalanche criterion.pdf | 644 KB | Adobe Acrobat PDF | View Details Download |