The properties of modular transformations and built on them hashing methods Keyless information (MASH-1 and MASH2), as well as key hashing methods that are based on algorithms MASH-1 and MASH-2 by changing the initialization vector as the secret key data. Investigated various kinds of cycle functions in the scheme of iterative hash, built using modular transformations, the problem of inverting which is equivalent to solving one of the well-known complexity-theoretic problems.
modular transformation, cyclic function key hashing
"Yssledovanye svoistv moduliarnыkh preobrazovanyi y metodov kheshyrovanyia ynformatsyy na ykh osnove" ,
Information Processing Systems,