Improving security of lightweith SHA-3 against preimage attacks
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such aspseudo-random bit sequences generator, key wrapping or one pass authentication, especially in weak devices (WSN, IoT, e...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2018-05-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/103845/PDF/23_1320-4311-1-PB.pdf |