清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

Development and analysis of the new hashing algorithm based on block cipher

MDC-2型 算法 散列函数 计算机科学 分组密码 密码哈希函数 密码学 理论计算机科学 双重哈希 计算机安全
作者
Kairat Sakan,Saule Nyssanbayeva,Nursulu Kapalova,Kunbolat Algazy,Ardabek Khompysh,Dilmuhanbet S. Dyusenbayev
出处
期刊:Eastern-European Journal of Enterprise Technologies [Private Company Technology Center]
卷期号:2 (9 (116)): 60-73 被引量:2
标识
DOI:10.15587/1729-4061.2022.252060
摘要

This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construct. To transform the block cipher CF into a one-way compression function, the Davis-Meyer scheme is used, which, according to the results of research, is recognized as a strong and secure scheme for constructing hash functions based on block ciphers. The symmetric CF block cipher algorithm used consists of three transformations (Stage-1, Stage-2, and Stage-3), which include modulo two addition, circular shift, and substitution box (four-bit S-boxes). The four substitution boxes are selected from the “golden” set of S-boxes, which have ideal cryptographic properties. The HBC-256 scheme is designed to strike an effective balance between computational speed and protection against a preimage attack. The CF algorithm uses an AES-like primitive as an internal transformation. The hash image was tested for randomness using the NIST (National Institute of Standards and Technology) statistical test suite, the results were examined for the presence of an avalanche effect in the CF encryption algorithm and the HBC-256 hash algorithm itself. The resistance of HBC-256 to near collisions has been practically tested. Since the classical block cipher key expansion algorithms slow down the hash function, the proposed algorithm is adapted for hardware and software implementation by applying parallel computing. A hashing algorithm was developed that has a sufficiently large freedom to select the sizes of the input blocks and the output hash digest. This will make it possible to create an almost universal hashing algorithm and use it in any cryptographic protocols and electronic digital signature algorithms

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
11秒前
16秒前
情怀应助无情的琳采纳,获得10
16秒前
相当鱼完成签到 ,获得积分10
21秒前
归尘发布了新的文献求助10
29秒前
量子星尘发布了新的文献求助10
32秒前
48秒前
无情的琳发布了新的文献求助10
53秒前
gszy1975完成签到,获得积分10
1分钟前
1分钟前
1分钟前
zzgpku完成签到,获得积分0
1分钟前
1分钟前
1分钟前
2分钟前
李健应助天天采纳,获得10
2分钟前
2分钟前
两个榴莲完成签到,获得积分0
2分钟前
2分钟前
逸云发布了新的文献求助30
2分钟前
量子星尘发布了新的文献求助10
2分钟前
球祝完成签到,获得积分10
3分钟前
3分钟前
归尘发布了新的文献求助10
3分钟前
欠缺完成签到,获得积分20
3分钟前
研友_VZG7GZ应助凉宫八月采纳,获得10
3分钟前
逸云完成签到,获得积分10
3分钟前
4分钟前
凉宫八月发布了新的文献求助10
4分钟前
4分钟前
4分钟前
4分钟前
5分钟前
凉宫八月完成签到,获得积分10
5分钟前
XZY发布了新的文献求助10
5分钟前
顾矜应助Wa1Zh0u采纳,获得10
5分钟前
5分钟前
知行者完成签到 ,获得积分10
5分钟前
Ttimer完成签到,获得积分10
5分钟前
6分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Introduction to strong mixing conditions volume 1-3 5000
Clinical Microbiology Procedures Handbook, Multi-Volume, 5th Edition 2000
The Cambridge History of China: Volume 4, Sui and T'ang China, 589–906 AD, Part Two 1000
The Composition and Relative Chronology of Dynasties 16 and 17 in Egypt 1000
Real World Research, 5th Edition 800
Qualitative Data Analysis with NVivo By Jenine Beekhuyzen, Pat Bazeley · 2024 800
热门求助领域 (近24小时)
化学 材料科学 生物 医学 工程类 计算机科学 有机化学 物理 生物化学 纳米技术 复合材料 内科学 化学工程 人工智能 催化作用 遗传学 数学 基因 量子力学 物理化学
热门帖子
关注 科研通微信公众号,转发送积分 5724137
求助须知:如何正确求助?哪些是违规求助? 5285050
关于积分的说明 15299615
捐赠科研通 4872220
什么是DOI,文献DOI怎么找? 2616750
邀请新用户注册赠送积分活动 1566605
关于科研通互助平台的介绍 1523490