Improving security of lightweith SHA-3 against preimage attacks

In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such aspseudo-random bit sequences generator, key wrapping or one pass authentication, especially in weak devices (WSN, IoT, e...

Full description

Bibliographic Details
Main Authors: Serhii Onopa, Zbigniew Kotulski
Format: Article
Language:English
Published: Polish Academy of Sciences 2018-05-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/103845/PDF/23_1320-4311-1-PB.pdf