With the current class of cryptographic algorithms growing weaker we face an increasingly large problem. I went ahead took two SHA-2 algorithms and created ASH-1 and ASH-2. The modifications are algorithm neutral and fairly simple, but add security and flexibility to the SHA family.
The hashing algorithm is detailed in this paper: http://xxx.lanl.gov.nyud.net:8090/abs/cs.CR/0501038 Comments, criticism, and help all appreciated. Thanks, D.J. Capelis Network Security and Cryptography Researcher _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
