To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

For a cryptographic hash function (a mathematical algorithm), a MASH-1 (Modular Arithmetic Secure Hash) is a hash function based on modular arithmetic.

YouTube Encyclopedic

  • 1/1
    Views:
    1 746 261
  • Multiplication Mash Up - A Fun Way to Learn Your Multiplication Facts!

Transcription

History

Despite many proposals, few hash functions based on modular arithmetic have withstood attack, and most that have tend to be relatively inefficient. MASH-1 evolved from a long line of related proposals successively broken and repaired.

Standard

Committee Draft ISO/IEC 10118-4 (Nov 95)

Description

MASH-1 involves use of an RSA-like modulus , whose bitlength affects the security. is a product of two prime numbers and should be difficult to factor, and for of unknown factorization, the security is based in part on the difficulty of extracting modular roots.

Let be the length of a message block in bit. is chosen to have a binary representation a few bits longer than , typically .

The message is padded by appending the message length and is separated into blocks of length . From each of these blocks , an enlarged block of length is created by placing four bits from in the lower half of each byte and four bits of value 1 in the higher half. These blocks are processed iteratively by a compression function:

Where and . denotes the bitwise OR and the bitwise XOR.

From are now calculated more data blocks by linear operations (where denotes concatenation):

These data blocks are now enlarged to like above, and with these the compression process continues with eight more steps:

Finally the hash value is , where is a prime number with .[1]

MASH-2

There is a newer version of the algorithm called MASH-2 with a different exponent. The original is replaced by . This is the only difference between these versions.

References

  • A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, ISBN 0-8493-8523-7
This page was last edited on 8 January 2024, at 19:31
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.