Diffusion Analysis of Message Expansion in STITCH-256


Cryptographic hash functions are built up from individual components, namely pre-processing, step transformation, and final processing. Some of the hash functions, such as SHA-256 and STITCH-256, employ non-linear message expansion in their pre-processing stage. However, STITCH-256 was claimed to produce high diffusion in its message expansion. In a… (More)


16 Figures and Tables

Slides referencing similar topics