To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

JH (hash function)

From Wikipedia, the free encyclopedia

JH
General
DesignersHongjun Wu
CertificationSHA-3 finalist
Detail
Digest sizes224, 256, 384, 512
Speed16.1 cpb on Core 2 in 64-bit mode using SSE2; 37.3 cpb using ANSI C.

JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition, in 2012 JH ultimately lost to NIST hash candidate Keccak.[1] JH has a 1024-bit state, and works on 512-bit input blocks. Processing an input block consists of three steps:

  1. XOR the input block into the left half of the state.
  2. Apply a 42-round unkeyed permutation (encryption function) to the state. This consists of 42 repetitions of:
    1. Break the input into 256 4-bit blocks, and map each through one of two 4-bit S-boxes, the choice being made by a 256-bit round-dependent key schedule. Equivalently, combine each input block with a key bit, and map the result through a 5→4 bit S-box.
    2. Mix adjacent 4-bit blocks using a maximum distance separable code over GF(24).
    3. Permute 4-bit blocks so that they will be adjacent to different blocks in following rounds.
  3. XOR the input block into the right half of the state.

The resulting digest is the last 224, 256, 384 or 512 bits from the 1024-bit final value. It is well suited to a bit slicing implementation using the SSE2 instruction set, giving speeds of 16.8 cycles per byte.

YouTube Encyclopedic

  • 1/3
    Views:
    923 195
    9 143
    195 893
  • Hash Tables and Hash Functions
  • SHA-3, Keccak and SHAKE (Sponge Function)
  • 1 LAC TRADINGVIEW INDICATOR FREE 🔥🔥

Transcription

Examples of JH hashes

Hash values of empty string.

JH-224("")
0x 2c99df889b019309051c60fecc2bd285a774940e43175b76b2626630
JH-256("")
0x 46e64619c18bb0a92a5e87185a47eef83ca747b8fcc8e1412921357e326df434
JH-384("")
0x 2fe5f71b1b3290d3c017fb3c1a4d02a5cbeb03a0476481e25082434a881994b0ff99e078d2c16b105ad069b569315328
JH-512("")
0x 90ecf2f76f9d2c8017d979ad5ab96b87d58fc8fc4b83060f3f900774faa2c8fabe69c5f4ff1ec2b61d6b316941cedee117fb04b1f4c5bc1b919ae841c50eec4f

Even a small change in the message will (with overwhelming probability) result in a mostly different hash, due to the avalanche effect. For example, adding a period to the end of the sentence:

JH-256("The quick brown fox jumps over the lazy dog")
0x 6a049fed5fc6874acfdc4a08b568a4f8cbac27de933496f031015b38961608a0
JH-256("The quick brown fox jumps over the lazy dog.")
0x d001ae2315421c5d3272bac4f4aa524bddd207530d5d26bbf51794f0da18fafc

References

  1. ^ "NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition" (Press release). NIST. 2012-10-02. Retrieved 2012-10-02.

External links


This page was last edited on 11 January 2024, at 02:36
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.