Skip to main content

ASH-20 Einweg-Hashfunktion

Project description

ash-20 hash function

The ASH-20 hash function is a cryptographic safe hash function developed by Joshua Dean Pond in 2023.

about the ash-20 hash function

The ASH-20 hash function uses complex mathematical operators to create a safe and non-traceable hash function. This makes it suitable for cryptographic applications where the integrity of data must be ensured.

installation

bash: pip install avalanchesumhash20

documentation

A detailed documentation of the ASH-20 hash function is included in the script. You can find them and more details in the Script-Dokumentation.

example script

from avalanchesumhash20 import AvalancheSumHash20

def main():
    input_text = input("Text: ")
    output_length = 79357612835769157957719395357591595
    iterations = 420
    modulo_value = 93537791153957593571955971579179595

    hash_generator = AvalancheSumHash20(input_text, output_length, iterations, modulo_value)
    result = hash_generator.main()

    print("Eingabe-Text:", input_text)
    print("Verschlüsselter Wert:", result)

if __name__ == "__main__":
    main()

example output

C:\Users\Joshua\OneDrive\Desktop>ASH-20
Text: Hello World
Eingabe-Text: Hello World
Verschlüsselter Wert: 72730973721879097623944926376665313

C:\Users\Joshua\OneDrive\Desktop>

This is an example of how you can encrypt a text

Mathematical Operators

The ASH-20 hash function uses complex mathematical operators to create a safe and non-traceable hash function. This makes it suitable for cryptographic applications where the integrity of data must be ensured. All mathematical aspects are explained here: mathematical aspects.

The ASH-20 hash function uses various mathematical operators to ensure safety and Einweg-Natur hash function:

Avalanche (cos function):

Using the derivative function cos creates a Avalanche-Effekt in which small changes in the input text lead to drastically different hash values. The function: f(H) = aH² + bH + c. The "H" in the function represents the hash.

XOR Operation (⊕):

The XOR operation is used to combine bits in the hash value and ensure that small changes in the input text lead to unpredictable changes in the hash. See XOR combination

OR (|):

The OR operation is used to set certain bits in the hash value to increase complexity and security.

AND (&):

The AND operation is used to delete certain bits in the hash value and to influence the distribution of bits.

functions of higher grades and square functions:

In addition to the basic operations, functions of higher degrees and square functions are also used to make the hash a one-way hash. This increases the complexity and makes it difficult to trace the hash value. See examples: Math. Operators (unit function)

bit shift (shift) to 7:

By shifting the bits in the hash value by 7 positions, the distribution of bits is further changed and the safety is increased.

modulo with outputlength:

The application of the Modulo-Operators with the Output-Length ensures that the hash value remains within the desired length.

fragmentation and chaining of the hashes:

The hash value is divided and repositioned to increase the Einweg-Natur of the hash function.

license

This project is licensed under the MIT license - see the LICENSE-Datei for details.

contact

Joshua Dean Pond Email: joshua.pond11@gmail.com

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

avalanchesumhash20-1.6.3.tar.gz (4.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

avalanchesumhash20-1.6.3-py3-none-any.whl (3.6 kB view details)

Uploaded Python 3

File details

Details for the file avalanchesumhash20-1.6.3.tar.gz.

File metadata

  • Download URL: avalanchesumhash20-1.6.3.tar.gz
  • Upload date:
  • Size: 4.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for avalanchesumhash20-1.6.3.tar.gz
Algorithm Hash digest
SHA256 9958a227b72b14e351a70b1db46aa3c8a5abca218112cfdba930cf38d8e754f8
MD5 14ab5bebcf6c0a53b2c9a89c7fb4ac6d
BLAKE2b-256 296cfed5c32ffed6f20c380868fe27cae2010f235fcf4a6b6c9e9fbf43c83ecb

See more details on using hashes here.

File details

Details for the file avalanchesumhash20-1.6.3-py3-none-any.whl.

File metadata

File hashes

Hashes for avalanchesumhash20-1.6.3-py3-none-any.whl
Algorithm Hash digest
SHA256 33dbcf073f92aaf7b21dcecae69c7d442742cc399c072d9fb80dfec91d3fac91
MD5 4bea2088e78d2b0906049f15fa4402b7
BLAKE2b-256 3f73292ee732dc365ac6de20ad5a612b5176f45043c4c20984a4d1294afcc151

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page