ASH Hashing Algorithm
With the current class of cryptographic algorithms growing weaker we face
an increasingly large problem. I went ahead took two SHA-2 algorithms and
created ASH-1 and ASH-2. The modifications are algorithm neutral and
fairly simple, but add security and flexibility to the SHA family.
The hashing algorithm is detailed in this paper:
http://xxx.lanl.gov.nyud.net:8090/abs/cs.CR/0501038
Comments, criticism, and help all appreciated.
Thanks,
D.J. Capelis
Network Security and Cryptography Researcher