已入深夜,您辛苦了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!祝你早点完成任务,早点休息,好梦!

Development and analysis of the new hashing algorithm based on block cipher

MDC-2型 算法 散列函数 计算机科学 分组密码 密码哈希函数 密码学 理论计算机科学 双重哈希 计算机安全
作者
Kairat Sakan,Saule Nyssanbayeva,Nursulu Kapalova,Kunbolat Algazy,Ardabek Khompysh,Dilmuhanbet S. Dyusenbayev
出处
期刊:Eastern-European Journal of Enterprise Technologies [Kharkiv State Academy of Physical Culture]
卷期号:2 (9 (116)): 60-73 被引量:2
标识
DOI:10.15587/1729-4061.2022.252060
摘要

This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construct. To transform the block cipher CF into a one-way compression function, the Davis-Meyer scheme is used, which, according to the results of research, is recognized as a strong and secure scheme for constructing hash functions based on block ciphers. The symmetric CF block cipher algorithm used consists of three transformations (Stage-1, Stage-2, and Stage-3), which include modulo two addition, circular shift, and substitution box (four-bit S-boxes). The four substitution boxes are selected from the “golden” set of S-boxes, which have ideal cryptographic properties. The HBC-256 scheme is designed to strike an effective balance between computational speed and protection against a preimage attack. The CF algorithm uses an AES-like primitive as an internal transformation. The hash image was tested for randomness using the NIST (National Institute of Standards and Technology) statistical test suite, the results were examined for the presence of an avalanche effect in the CF encryption algorithm and the HBC-256 hash algorithm itself. The resistance of HBC-256 to near collisions has been practically tested. Since the classical block cipher key expansion algorithms slow down the hash function, the proposed algorithm is adapted for hardware and software implementation by applying parallel computing. A hashing algorithm was developed that has a sufficiently large freedom to select the sizes of the input blocks and the output hash digest. This will make it possible to create an almost universal hashing algorithm and use it in any cryptographic protocols and electronic digital signature algorithms
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
大圆土豆完成签到 ,获得积分10
1秒前
沉默访冬发布了新的文献求助10
1秒前
机灵哈密瓜完成签到,获得积分10
2秒前
大妙妙完成签到 ,获得积分10
2秒前
2秒前
忘桑榆完成签到,获得积分10
2秒前
3秒前
3秒前
桐桐应助EDEN采纳,获得10
5秒前
科目三应助小包子采纳,获得10
5秒前
学术妲己完成签到,获得积分20
6秒前
锥形瓶应助shinn采纳,获得10
6秒前
6秒前
苏澄发布了新的文献求助10
7秒前
浮游应助yaling采纳,获得10
7秒前
9秒前
10秒前
11秒前
liufan完成签到 ,获得积分10
11秒前
12秒前
小二郎应助学术妲己采纳,获得10
13秒前
苏澄完成签到,获得积分10
15秒前
16秒前
不安青牛应助shinn采纳,获得10
16秒前
ericshenger发布了新的文献求助30
16秒前
18秒前
19秒前
19秒前
李义志完成签到 ,获得积分10
20秒前
21秒前
美好善斓完成签到 ,获得积分10
22秒前
杨武天一发布了新的文献求助10
22秒前
潇潇完成签到 ,获得积分10
24秒前
星际舟完成签到,获得积分10
28秒前
32秒前
33秒前
34秒前
36秒前
EDEN发布了新的文献求助10
37秒前
37秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
The Complete Pro-Guide to the All-New Affinity Studio: The A-to-Z Master Manual: Master Vector, Pixel, & Layout Design: Advanced Techniques for Photo, Designer, and Publisher in the Unified Suite 1000
Teacher Wellbeing: A Real Conversation for Teachers and Leaders 500
Synthesis and properties of compounds of the type A (III) B2 (VI) X4 (VI), A (III) B4 (V) X7 (VI), and A3 (III) B4 (V) X9 (VI) 500
Microbially Influenced Corrosion of Materials 500
Die Fliegen der Palaearktischen Region. Familie 64 g: Larvaevorinae (Tachininae). 1975 500
The YWCA in China The Making of a Chinese Christian Women’s Institution, 1899–1957 400
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5401154
求助须知:如何正确求助?哪些是违规求助? 4520145
关于积分的说明 14078818
捐赠科研通 4433229
什么是DOI,文献DOI怎么找? 2434030
邀请新用户注册赠送积分活动 1426180
关于科研通互助平台的介绍 1404792