Anew secure and fast hashing algorithm (SFHA-256)

被引:0
|
作者
Elkamchouchi, Hassan. M.
Nasr, Mohamed E.
Abdelfatah, Roayat Ismail
机构
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a new secure and fast hashing algorithm based on the generic 3C construction. This construction is obtained by modifying the Merkle-Damgard (M-D) iterated construction used to construct iterated hash functions and it is more resistant against the recent differential multi-blocks attacks and the extension attacks than the M-D iterated hash construction. Also the M-D construction is not practical construction by itself, while the generic 3C is a practical construction which preserves the collision resistance of the compression function in a much better way compared to the hash functions that followed the M-D construction, These advantages are at the expense of one extra iteration of the compression function compared to the M-D construction. his disadvantage by proposing a step function with a reduced number of operations. All tests performed in this paper show that SFHA-256 is more secure and has a better performance than SHA-256 which makes it preferred in many applications.
引用
收藏
页码:U497 / U504
页数:8
相关论文
共 50 条
  • [21] Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm
    Nagarajan, Senthil Murugan
    Deverajan, Ganesh Gopal
    Kumaran, U.
    Thirunavukkarasan, M.
    Alshehri, Mohammad Dahman
    Alkhalaf, Salem
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8876 - 8884
  • [22] A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
    Zhu, Shuqin
    Zhu, Congxu
    Wang, Wenhong
    ENTROPY, 2018, 20 (09)
  • [23] A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
    Garcia, Rommel
    Algredo-Badillo, Ignacio
    Morales-Sandoval, Miguel
    Feregrino-Uribe, Claudia
    Cumplido, Rene
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 194 - 202
  • [24] Fast agglomerative hierarchical clustering algorithm using Locality-Sensitive Hashing
    Koga, Hisashi
    Ishibashi, Tetsuo
    Watanabe, Toshinori
    KNOWLEDGE AND INFORMATION SYSTEMS, 2007, 12 (01) : 25 - 53
  • [25] Fast agglomerative hierarchical clustering algorithm using Locality-Sensitive Hashing
    Hisashi Koga
    Tetsuo Ishibashi
    Toshinori Watanabe
    Knowledge and Information Systems, 2007, 12 : 25 - 53
  • [26] Towards ANN-based Scalable Hashing Algorithm for Secure Task Processing in Computational Clouds
    Tchorzewski, Jacek
    Jakobik, Agnieszka
    Grzonka, Daniel
    PROCEEDINGS OF THE 33RD INTERNATIONAL ECMS CONFERENCE ON MODELLING AND SIMULATION (ECMS 2019), 2019, 33 (01): : 421 - 427
  • [27] Lightweight, Fast and Secure Data Authentication Algorithm for Satellite Application
    Murtaza, Abid
    Pirzada, Syed Jahanzeb Hussain
    Xu, Tongge
    Liu Jianwei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION ENGINEERING (ICECE 2019), 2019, : 157 - 161
  • [28] Fast Face Tracking-by-Detection Algorithm for Secure Monitoring
    Su, Jia
    Gao, Lihui
    Li, Wei
    Xia, Yu
    Cao, Ning
    Wang, Ruichao
    APPLIED SCIENCES-BASEL, 2019, 9 (18):
  • [29] HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
    Kammoun, Manel
    Elleuchi, Manel
    Abid, Mohamed
    Obeid, Abdulfattah M.
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2021, 17 (02) : 87 - 96
  • [30] Implementation of Efficient SHA-256 Hash Algorithm for Secure Vehicle Communication using FPGA
    Jeong, Chanbok
    Kim, Youngmin
    2014 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2014, : 224 - 225