EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY

被引:2
|
作者
Khan, Burhan Ul Islam [1 ]
Olanrewaju, Rashidah Funke [1 ]
Morshidi, Malik Arman [1 ]
Mir, Roohie Naaz [2 ]
Kiah, Miss Laiha Binti Mat [3 ]
Khan, Abdul Mobeen [4 ]
机构
[1] Int Islamic Univ Malaysia IIUM, KOE, Dept ECE, Kuala Lumpur 50728, Malaysia
[2] Natl Inst Technol NIT, Dept Comp Sci & Engn, Srinagar 190006, Jammu & Kashmir, India
[3] Univ Malaya UM, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[4] ALEM Solut & Technol, Aspen Commercial Tower, Dubai 11562, U Arab Emirates
关键词
Secured Hash Algorithms; Message Digest; Cryptographic Hashing; Statistical Analysis; Fault Analysis;
D O I
10.22452/mjcs.vol35no3.1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications. Cryptographic hash functions have been extensively employed to ensure data integrity in insecure environments. Hash functions are also combined with digital signatures to offer identity verification mechanisms and non-repudiation services. The federal organization National Institute of Standards and Technology (NIST) established the SHA to provide security and optimal performance over some time. The most well-known hashing standards are SHA-1, SHA-2, and SHA-3. This paper discusses the background of hashing, followed by elaborating on the evolution of the SHA family. The main goal is to present a comparative analysis of these hashing standards and focus on their security strength, performance and limitations against common attacks. The complete assessment was carried out using statistical analysis, performance analysis and extensive fault analysis over a defined test environment. The study outcome showcases the issues of SHA-1 besides exploring the security benefits of all the dominant variants of SHA-2 and SHA-3. The study also concludes that SHA-3 is the best option to mitigate novice intruders while allowing better performance cost-effectively.
引用
收藏
页码:179 / 200
页数:22
相关论文
共 50 条
  • [1] SHA - THE SECURE HASH ALGORITHM
    STALLINGS, W
    [J]. DR DOBBS JOURNAL, 1994, 19 (04): : 32 - &
  • [2] Secure Hash Algorithm SHA-3
    Dirk Fox
    [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
  • [3] A Secure Hash Algorithm with only 8 Folded SHA-1 Steps
    Gligoroski, Danilo
    Markovski, Smile
    Knapskog, Svein J.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 194 - 205
  • [4] VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512
    Kayalvizhi, R.
    Subramanian, R. Harihara
    Santhosh, R. Girish
    Gurubaran, J.
    Vaidehi, V.
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 105 - 113
  • [5] AN EFFICIENT FAULT DETECTION SCHEME FOR THE SECURE HASH ALGORITHM SHA-512
    Kahri, Fatma
    Mestiri, Hassen
    Bouallegue, Belgacem
    Machhout, Mohsen
    [J]. 2017 INTERNATIONAL CONFERENCE ON GREEN ENERGY & CONVERSION SYSTEMS (GECS), 2017,
  • [6] A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
    Zhu, Shuqin
    Zhu, Congxu
    Wang, Wenhong
    [J]. ENTROPY, 2018, 20 (09)
  • [7] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein
    Latif, Kashif
    Tariq, Muhammad
    Aziz, Arshad
    Mahboob, Athar
    [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
  • [8] A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
    Garcia, Rommel
    Algredo-Badillo, Ignacio
    Morales-Sandoval, Miguel
    Feregrino-Uribe, Claudia
    Cumplido, Rene
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 194 - 202
  • [9] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist
    Rao, M. Muzaffar
    Latif, Kashif
    Aziz, Arshad
    Mahboob, Athar
    [J]. EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
  • [10] HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
    Kammoun, Manel
    Elleuchi, Manel
    Abid, Mohamed
    Obeid, Abdulfattah M.
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2021, 17 (02) : 87 - 96