You're Invited:Meet the Socket Team at BlackHat and DEF CON in Las Vegas, Aug 4-6.RSVP
Socket
Book a DemoInstallSign in
Socket

avalanchesumhash20

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

avalanchesumhash20

ASH-20 Einweg-Hashfunktion

1.6.3
pipPyPI
Maintainers
1

ash-20 hash function

The ASH-20 hash function is a cryptographic safe hash function developed by Joshua Dean Pond in 2023.

about the ash-20 hash function

The ASH-20 hash function uses complex mathematical operators to create a safe and non-traceable hash function. This makes it suitable for cryptographic applications where the integrity of data must be ensured.

installation

bash: pip install avalanchesumhash20

documentation

A detailed documentation of the ASH-20 hash function is included in the script. You can find them and more details in the Script-Dokumentation.

example script

from avalanchesumhash20 import AvalancheSumHash20

def main():
    input_text = input("Text: ")
    output_length = 79357612835769157957719395357591595
    iterations = 420
    modulo_value = 93537791153957593571955971579179595

    hash_generator = AvalancheSumHash20(input_text, output_length, iterations, modulo_value)
    result = hash_generator.main()

    print("Eingabe-Text:", input_text)
    print("Verschlüsselter Wert:", result)

if __name__ == "__main__":
    main()

example output

C:\Users\Joshua\OneDrive\Desktop>ASH-20
Text: Hello World
Eingabe-Text: Hello World
Verschlüsselter Wert: 72730973721879097623944926376665313

C:\Users\Joshua\OneDrive\Desktop>

This is an example of how you can encrypt a text

Mathematical Operators

The ASH-20 hash function uses complex mathematical operators to create a safe and non-traceable hash function. This makes it suitable for cryptographic applications where the integrity of data must be ensured. All mathematical aspects are explained here: mathematical aspects.

The ASH-20 hash function uses various mathematical operators to ensure safety and Einweg-Natur hash function:

Avalanche (cos function):

Using the derivative function cos creates a Avalanche-Effekt in which small changes in the input text lead to drastically different hash values. The function: f(H) = aH² + bH + c. The "H" in the function represents the hash.

XOR Operation (⊕):

The XOR operation is used to combine bits in the hash value and ensure that small changes in the input text lead to unpredictable changes in the hash. See XOR combination

OR (|):

The OR operation is used to set certain bits in the hash value to increase complexity and security.

AND (&):

The AND operation is used to delete certain bits in the hash value and to influence the distribution of bits.

functions of higher grades and square functions:

In addition to the basic operations, functions of higher degrees and square functions are also used to make the hash a one-way hash. This increases the complexity and makes it difficult to trace the hash value. See examples: Math. Operators (unit function)

bit shift (shift) to 7:

By shifting the bits in the hash value by 7 positions, the distribution of bits is further changed and the safety is increased.

modulo with outputlength:

The application of the Modulo-Operators with the Output-Length ensures that the hash value remains within the desired length.

fragmentation and chaining of the hashes:

The hash value is divided and repositioned to increase the Einweg-Natur of the hash function.

license

This project is licensed under the MIT license - see the LICENSE-Datei for details.

contact

Joshua Dean Pond Email: joshua.pond11@gmail.com

Keywords

python

FAQs

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts