Cryptographic Keyed Hash Function: PARAŚU-256
Cryptography has distinct paramount significance in interconnected environment where whether we concern about ‘Computer-Security,’ ‘Information-Security,’ ‘Network-Security’ etc., doesn’t matters and, ingredients of this particular branch of computer science viz. ‘Encryption/Decryption’ systems, ‘Hash-Functions,’ ‘Digital-Signatures’ etc. also playing vital role from years in order to manage ‘Confidentiality,’ ‘Integrity’ and ‘Authenticity’ of resources. The Encryption/Decryption Cryptosystems managing the Confidentiality and Hash-Functions are fully devoted towards to look after the Integrity, Authenticity either alone or with Digital Signature schemes. There is a huge list of ‘Hash-Algorithms’ available with us to provide dedicated services (i.e., security) depends on how complex is to break it. Few renowned names are MD5, Blake, CRUSH, Grøstl, HAIFA, JH, Lake, SHA, Skein, Whirlpool etc., Keyed/Un-keyed constructions having its own justifiable capabilities. So in this direction we’re proposing a new secure keyed Hash-Function especially for military services where security is major concern apart from resource utilization which not only fulfilling basic properties but also providing justifiable services in order to manage integrity/authenticity of resources.