Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications

被引:1
|
作者
Leekha, Alka [1 ,2 ]
Shaikh, Alam [3 ]
机构
[1] Visvesvaraya Technol Univ, Belgaum 590018, Karnataka, India
[2] Bharati Vidyapeeth Coll Engn, New Delhi 110063, India
[3] Padmabhushan Vasantdada Patil Pratishthans Coll E, Mumbai 400022, Maharashtra, India
来源
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY | 2019年 / 22卷 / 02期
关键词
Hash Algorithms; SHA-2; SHA-256; SHA-512; SHA-384; SHA-224; SHA-512/256; SHA-512/224;
D O I
10.1080/09720529.2019.1582865
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A Secure hash algorithm is grounded on the principles of message digest algorithms that are used in the design of the algorithms like MD4 and MD5. The main application of this algorithm is that it can be used in security applications for authentication and data validation like message authentication, digital signature and fingerprinting. It can also be used in detecting duplicate data and uniquely identifying files. In this paper we analyzed the role of some of the building blocks of SHA-2 family. We have demonstrated that the disturbance-correction strategy is applicable to the SHA-512 architecture and proved that functions Sigma,partial derivative are vital for the security of SHA-512, without them it is possible to find collisions with complexity 264 hash operations. We also demonstrated the functioning of 256-bit which was previously designed for 32 bit architecture but in this paper it is implemented using 64-bit architecture.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 6 条
  • [1] A Flexible Hardware Implementation of SHA-1 and SHA-2 Hash Functions
    Docherty, James
    Koelmans, Albert
    2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2011, : 1932 - 1935
  • [2] Optimisation of the SHA-2 family of hash functions on FPGAs
    McEvoy, Robert P.
    Crowe, Francis M.
    Murphy, Colin C.
    Marnane, William P.
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: EMERGING VLSI TECHNOLOGIES AND ARCHITECTURES, 2006, : 317 - +
  • [3] Implementation of the SHA-2 Hash Family Standard Using FPGAs
    N. Sklavos
    O. Koufopavlou
    The Journal of Supercomputing, 2005, 31 : 227 - 248
  • [4] Implementation of the SHA-2 hash family standard using FPGAs
    Sklavos, N
    Koufopavlou, O
    JOURNAL OF SUPERCOMPUTING, 2005, 31 (03): : 227 - 248
  • [5] Efficient Fault Tolerant SHA-2 Hash Functions for Space Applications
    Juliato, Marcio
    Gebotys, Catherine
    Elbaz, Reouven
    2009 IEEE AEROSPACE CONFERENCE, VOLS 1-7, 2009, : 1949 - 1964
  • [6] Simulation Analysis and Comparison of New Hybrid TLI-μTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
    Eledlebi, Khouloud
    Alzubaidi, Ahmed Adel
    Yeun, Chan Yeob
    Damiani, Ernesto
    Mateu, Victor
    Al-Hammadi, Yousof
    SENSORS, 2022, 22 (23)