<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=N-Hash</id>
	<title>N-Hash - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=N-Hash"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=N-Hash&amp;action=history"/>
	<updated>2026-05-15T14:49:20Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=N-Hash&amp;diff=2478&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;In cryptography, '''N-Hash''' is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 by Miyaguc...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=N-Hash&amp;diff=2478&amp;oldid=prev"/>
		<updated>2019-03-23T07:43:12Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;In &lt;a href=&quot;/index.php?title=Cryptography&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Cryptography (page does not exist)&quot;&gt;cryptography&lt;/a&gt;, &amp;#039;&amp;#039;&amp;#039;N-Hash&amp;#039;&amp;#039;&amp;#039; is a &lt;a href=&quot;/Cryptographic_hash_function&quot; title=&quot;Cryptographic hash function&quot;&gt;cryptographic hash function&lt;/a&gt; based on the &lt;a href=&quot;/index.php?title=FEAL&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;FEAL (page does not exist)&quot;&gt;FEAL&lt;/a&gt; round function, and is now considered insecure. It was proposed in 1990 by Miyaguc...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;In [[cryptography]], '''N-Hash''' is a [[cryptographic hash function]] based on the [[FEAL]] round function, and is now considered insecure. It was proposed in 1990 by Miyaguchi et al.; weaknesses were published the following year.&lt;br /&gt;
&lt;br /&gt;
N-Hash has a 128-bit hash size. A message is divided into 128-bit blocks, and each block is combined with the hash value computed so far using the ''g'' [[One-way compression function|compression function]]. ''g'' contains eight rounds, each of which uses an ''F'' function, similar to the one used by [[FEAL]].&lt;br /&gt;
&lt;br /&gt;
[[Eli Biham]] and [[Adi Shamir]] (1991) applied the technique of [[differential cryptanalysis]] to N-Hash, and showed that [[hash collision|collision]]s could be generated faster than by a [[birthday attack]] for N-Hash variants with even up to 12 rounds.&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>