Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. N-hash - Wikipedia
N-hash - Wikipedia
From Wikipedia, the free encyclopedia
Cryptographic hash function
N-hash
General
DesignersS. Miyaguchi
K. Ohta
M. Iwata
First published1990
Derived fromFEAL
Detail
Digest sizes128 bits
StructureIterated hash function
Rounds8

In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an article by Miyaguchi, Ohta, and Iwata;[1] weaknesses were published the following year.[2]

N-hash has a 128-bit hash size. A message is divided into 128-bit blocks, and each block is combined with the hash value computed so far using the g compression function. g contains eight rounds, each of which uses an F function, similar to the one used by FEAL.

Eli Biham and Adi Shamir (1991) applied the technique of differential cryptanalysis to N-hash, and showed that collisions could be generated faster than by a birthday attack for N-hash variants with even up to 12 rounds.[2]

Design

[edit]

N-hash follows an early block cipher–based approach to cryptographic hash function design, in which the compression function is constructed from a cipher-like round function rather than from a dedicated hash-specific primitive. Such designs were common in the late 1980s and early 1990s, prior to the widespread adoption of purpose-built hash functions.[3][4][5] The chaining mechanism of N-hash combines the output of the round function with both the current message block and the previous hash state. This structure was later studied in the context of generic block cipher–based hash constructions and their resistance to known cryptanalytic techniques.[2][6]

Cryptanalysis

[edit]

The cryptanalysis of N-hash highlighted the risks of directly reusing block cipher components in hash function design without sufficient security margins. Attacks on N-hash demonstrated that structural properties exploitable in encryption algorithms could also undermine collision resistance when applied in a hashing context.[2][7][8] As a result of these findings, N-hash was never adopted in practical cryptographic applications. It is cited primarily in academic literature as an early example that influenced later research into secure hash function construction and the separation of design principles for encryption and hashing.[9]

References

[edit]
  1. ^ Miyaguchi, S.; Ohta, K.; Iwata, M. (November 1990). "128-bit hash function (N-hash)". NTT Review. 2 (6): 128–132.
  2. ^ a b c d Biham, Eli; Shamir, Adi (1991). "Differential Cryptanalysis of Feal and N-Hash". In Davies, Donald W. (ed.). Advances in Cryptology — EUROCRYPT '91. Lecture Notes in Computer Science. Vol. 547. Berlin, Heidelberg: Springer. pp. 1–16. doi:10.1007/3-540-46416-6_1. ISBN 978-3-540-54620-7.
  3. ^ Preneel, Bart (1993). Analysis and Design of Cryptographic Hash Functions (PDF) (PhD dissertation). Katholieke Universiteit Leuven. Archived from the original (PDF) on 2024-04-22. Retrieved 2025-12-22.
  4. ^ Ismailova, R. (2012). Block Cipher Based Hashed Functions (PDF) (PhD thesis). Middle East Technical University. Retrieved 2025-12-22.
  5. ^ Thomsen, S. S. (2012). Cryptographic Hash Functions (PDF) (PhD thesis). Technical University of Denmark. Archived from the original (PDF) on 2019-02-25. Retrieved 2025-12-22.
  6. ^ Danda, M. K. R. (2007). Design and Analysis of Hash Functions (PDF) (PhD thesis). Victoria University. Archived from the original (PDF) on 2025-03-21. Retrieved 2025-12-22.
  7. ^ Khovratovich, Dmitry (2009). "Cryptanalysis of Hash Functions with Structures". In Jacobson, M. J.; Rijmen, V.; Safavi-Naini, R. (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5867. Berlin, Heidelberg: Springer. pp. 108–125. doi:10.1007/978-3-642-05445-7_7. ISBN 978-3-642-05443-3. Archived from the original on 18 June 2018.
  8. ^ Phan, Raphael C.-W.; Aumasson, Jean-Philippe (2009). "On Hashing With Tweakable Ciphers" (PDF). 2009 IEEE International Conference on Communications. IEEE. pp. 1–5. doi:10.1109/ICC.2009.5199240. Archived from the original (PDF) on 2025-04-16. Retrieved 2025-12-22.
  9. ^ Lai, Xucjia; Massey, James L. (1993). "Hash Functions Based on Block Ciphers". In Rueppel, Rainer A. (ed.). Advances in Cryptology — EUROCRYPT' 92. Lecture Notes in Computer Science. Vol. 658. Berlin, Heidelberg: Springer. pp. 55–70. doi:10.1007/3-540-47555-9_5. ISBN 978-3-540-47555-2. Archived from the original on 2023-10-08.
  • v
  • t
  • e
Cryptographic hash functions and message authentication codes
  • List
  • Comparison
  • Known attacks
Common functions
  • MD5 (compromised)
  • SHA-1 (compromised)
  • SHA-2
  • SHA-3
  • BLAKE2
SHA-3 finalists
  • BLAKE
  • Grøstl
  • JH
  • Skein
  • Keccak (winner)
Other functions
  • BLAKE3
  • CubeHash
  • ECOH
  • FSB
  • Fugue
  • GOST
  • HAS-160
  • HAVAL
  • Kupyna
  • LSH
  • Lane
  • MASH-1
  • MASH-2
  • MD2
  • MD4
  • MD6
  • MDC-2
  • N-hash
  • RIPEMD
  • RadioGatún
  • SIMD
  • SM3
  • SWIFFT
  • Shabal
  • Snefru
  • Streebog
  • Tiger
  • VSH
  • Whirlpool
Password hashing/
key stretching functions
  • Argon2
  • Balloon
  • bcrypt
  • Catena
  • crypt
  • LM hash
  • Lyra2
  • Makwa
  • PBKDF2
  • scrypt
  • yescrypt
General purpose
key derivation functions
  • HKDF
  • KDF1/KDF2
MAC functions
  • CBC-MAC
  • DAA
  • GMAC
  • HMAC
  • NMAC
  • OMAC/CMAC
  • PMAC
  • Poly1305
  • SipHash
  • UMAC
  • VMAC
Authenticated
encryption
modes
  • CCM
  • ChaCha20-Poly1305
  • CWC
  • EAX
  • GCM
  • IAPM
  • OCB
Attacks
  • Collision attack
  • Preimage attack
  • Birthday attack
  • Brute-force attack
  • Rainbow table
  • Side-channel attack
  • Length extension attack
Design
  • Avalanche effect
  • Hash collision
  • Merkle–Damgård construction
  • Sponge function
  • HAIFA construction
Standardization
  • CAESAR Competition
  • CRYPTREC
  • NESSIE
  • NIST hash function competition
  • Password Hashing Competition
  • NSA Suite B
  • CNSA
Utilization
  • Hash-based cryptography
  • Merkle tree
  • Message authentication
  • Proof of work
  • Salt
  • Pepper
  • v
  • t
  • e
Cryptography
General
  • History of cryptography
  • Outline of cryptography
  • Classical cipher
  • Cryptographic protocol
    • Authentication protocol
  • Cryptographic primitive
  • Cryptanalysis
  • Cryptocurrency
  • Cryptosystem
  • Cryptographic nonce
  • Cryptovirology
  • Hash function
    • Cryptographic hash function
    • Key derivation function
    • Secure Hash Algorithms
  • Digital signature
  • Kleptography
  • Key (cryptography)
  • Key exchange
  • Key generator
  • Key schedule
  • Key stretching
  • Keygen
  • Machines
  • Ransomware
  • Random number generation
    • Cryptographically secure pseudorandom number generator (CSPRNG)
  • Pseudorandom noise (PRN)
  • Secure channel
  • Insecure channel
  • Subliminal channel
  • Encryption
  • Decryption
  • End-to-end encryption
  • Harvest now, decrypt later
  • Information-theoretic security
  • Plaintext
  • Codetext
  • Ciphertext
  • Shared secret
  • Trapdoor function
  • Trusted timestamping
  • Key-based routing
  • Onion routing
  • Garlic routing
  • Kademlia
  • Mix network
Mathematics
  • Cryptographic hash function
  • Block cipher
  • Stream cipher
  • Symmetric-key algorithm
  • Authenticated encryption
  • Public-key cryptography
  • Quantum key distribution
  • Quantum cryptography
  • Post-quantum cryptography
  • Message authentication code
  • Random numbers
  • Steganography
  • Category
Stub icon

This cryptography-related article is a stub. You can help Wikipedia by adding missing information.

  • v
  • t
  • e
Retrieved from "https://teknopedia.ac.id/w/index.php?title=N-hash&oldid=1332739777"
Categories:
  • Cryptographic hash functions
  • Cryptography stubs
Hidden categories:
  • Articles with short description
  • Short description is different from Wikidata
  • All stub articles

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id