Development and analysis of the new hashing algorithm based on block cipher

MDC-2型 算法 散列函数 计算机科学 分组密码 密码哈希函数 密码学 理论计算机科学 双重哈希 计算机安全
作者
Kairat Sakan,Saule Nyssanbayeva,Nursulu Kapalova,Kunbolat Algazy,Ardabek Khompysh,Dilmuhanbet S. Dyusenbayev
出处
期刊:Eastern-European Journal of Enterprise Technologies [Kharkiv State Academy of Physical Culture]
卷期号:2 (9 (116)): 60-73 被引量:2
标识
DOI:10.15587/1729-4061.2022.252060
摘要

This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construct. To transform the block cipher CF into a one-way compression function, the Davis-Meyer scheme is used, which, according to the results of research, is recognized as a strong and secure scheme for constructing hash functions based on block ciphers. The symmetric CF block cipher algorithm used consists of three transformations (Stage-1, Stage-2, and Stage-3), which include modulo two addition, circular shift, and substitution box (four-bit S-boxes). The four substitution boxes are selected from the “golden” set of S-boxes, which have ideal cryptographic properties. The HBC-256 scheme is designed to strike an effective balance between computational speed and protection against a preimage attack. The CF algorithm uses an AES-like primitive as an internal transformation. The hash image was tested for randomness using the NIST (National Institute of Standards and Technology) statistical test suite, the results were examined for the presence of an avalanche effect in the CF encryption algorithm and the HBC-256 hash algorithm itself. The resistance of HBC-256 to near collisions has been practically tested. Since the classical block cipher key expansion algorithms slow down the hash function, the proposed algorithm is adapted for hardware and software implementation by applying parallel computing. A hashing algorithm was developed that has a sufficiently large freedom to select the sizes of the input blocks and the output hash digest. This will make it possible to create an almost universal hashing algorithm and use it in any cryptographic protocols and electronic digital signature algorithms
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
量子星尘发布了新的文献求助10
刚刚
jeeya完成签到,获得积分10
1秒前
3秒前
科目三应助科研通管家采纳,获得10
3秒前
科目三应助科研通管家采纳,获得10
3秒前
伦语发布了新的文献求助10
3秒前
顾矜应助科研通管家采纳,获得10
3秒前
xuzj应助科研通管家采纳,获得10
3秒前
xuzj应助科研通管家采纳,获得10
3秒前
3秒前
NexusExplorer应助科研通管家采纳,获得10
3秒前
3秒前
3秒前
丘比特应助科研通管家采纳,获得10
4秒前
yull完成签到,获得积分10
4秒前
小巧书雪完成签到,获得积分10
7秒前
大大怪将军完成签到,获得积分10
8秒前
哈哈哈完成签到 ,获得积分0
8秒前
小怪完成签到,获得积分10
9秒前
爱吃泡芙完成签到,获得积分10
10秒前
白桃战士完成签到,获得积分10
11秒前
13秒前
qingchenwuhou完成签到 ,获得积分10
13秒前
XXX完成签到,获得积分10
14秒前
锡嘻完成签到 ,获得积分10
14秒前
15秒前
彗星入梦完成签到 ,获得积分10
15秒前
恋恋青葡萄完成签到,获得积分10
15秒前
隐形万言完成签到,获得积分10
17秒前
Time完成签到,获得积分10
17秒前
土木研学僧完成签到,获得积分10
18秒前
yjy完成签到 ,获得积分10
18秒前
A溶大美噶完成签到,获得积分10
18秒前
yar应助萨尔莫斯采纳,获得10
19秒前
Will发布了新的文献求助10
19秒前
美好的鹏笑完成签到,获得积分10
21秒前
啦啦啦啦啦完成签到,获得积分10
21秒前
LYegoist完成签到,获得积分10
23秒前
可爱的小丸子完成签到,获得积分10
23秒前
一川烟叶完成签到,获得积分10
25秒前
高分求助中
【提示信息,请勿应助】关于scihub 10000
Les Mantodea de Guyane: Insecta, Polyneoptera [The Mantids of French Guiana] 3000
徐淮辽南地区新元古代叠层石及生物地层 3000
The Mother of All Tableaux: Order, Equivalence, and Geometry in the Large-scale Structure of Optimality Theory 3000
Handbook of Industrial Diamonds.Vol2 1100
Global Eyelash Assessment scale (GEA) 1000
Picture Books with Same-sex Parented Families: Unintentional Censorship 550
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 冶金 细胞生物学 免疫学
热门帖子
关注 科研通微信公众号,转发送积分 4038201
求助须知:如何正确求助?哪些是违规求助? 3575940
关于积分的说明 11373987
捐赠科研通 3305747
什么是DOI,文献DOI怎么找? 1819274
邀请新用户注册赠送积分活动 892662
科研通“疑难数据库(出版商)”最低求助积分说明 815022