<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=JH_%28hash_function%29</id>
	<title>JH (hash function) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=JH_%28hash_function%29"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=JH_(hash_function)&amp;action=history"/>
	<updated>2026-05-15T10:23:46Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=JH_(hash_function)&amp;diff=2449&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''JH''' is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition,...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=JH_(hash_function)&amp;diff=2449&amp;oldid=prev"/>
		<updated>2019-03-22T03:52:07Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;JH&amp;#039;&amp;#039;&amp;#039; is a &lt;a href=&quot;/Cryptographic_hash_function&quot; title=&quot;Cryptographic hash function&quot;&gt;cryptographic hash function&lt;/a&gt; submitted to the &lt;a href=&quot;/NIST_hash_function_competition&quot; title=&quot;NIST hash function competition&quot;&gt;NIST hash function competition&lt;/a&gt; by Hongjun Wu. Though chosen as one of the five finalists of the competition,...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''JH''' is a [[cryptographic hash function]] submitted to the [[NIST hash function competition]] by Hongjun Wu. Though chosen as one of the five finalists of the competition, JH ultimately lost to NIST hash candidate [[Keccak]]. JH has a 1024-bit state, and works on 512-bit input blocks. Processing an input block consists of three steps:&lt;br /&gt;
# XOR the input block into the left half of the state.&lt;br /&gt;
# Apply a 42-round unkeyed permutation (encryption function) to the state. This consists of 42 repetitions of:&lt;br /&gt;
## Break the input into 256 4-bit blocks, and map each through one of two 4-bit [[S-box]]es, the choice being made by a 256-bit round-dependent key schedule. Equivalently, combine each input block with a key bit, and map the result through a 5→4 bit S-box.&lt;br /&gt;
## Mix adjacent 4-bit blocks using a [[maximum distance separable code]] over [[Finite field|GF(2&amp;amp;lt;sup&amp;amp;gt;4&amp;amp;lt;/sup&amp;amp;gt;)]].&lt;br /&gt;
## Permute 4-bit blocks so that they will be adjacent to different blocks in following rounds.&lt;br /&gt;
# XOR the input block into the right half of the state.&lt;br /&gt;
The resulting digest is the first 224, 256, 384 or 512 bits from the 1024-bit final value.&lt;br /&gt;
It is well suited to a [[bit slicing]] implementation using the [[SSE2]] instruction set, giving speeds of 16.8 [[Cycles per byte]].&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>