HCAHF: A new family of CA-based hash functions

被引:0
|
作者
Sadak A. [1 ]
Ezzahra Ziani F. [1 ]
Echandouri B. [1 ]
Hanin C. [1 ]
Omary F. [1 ]
机构
[1] Faculty of Science, Mohammed V University Rabat
关键词
Avalanche; Boolean function; Cellular automata; Cryptography; Dedicated attacks; Dieharder battery of tests; Generic attacks; Hash function; Information security; Nist statistical suite;
D O I
10.14569/ijacsa.2019.0101267
中图分类号
学科分类号
摘要
Cryptographic hash functions (CHF) represent a core cryptographic primitive. They have application in digital signature and message authentication protocols. Their main building block are Boolean functions. Those functions provide pseudo-randomness and sensitivity to the input. They also help prevent and lower the risk of attacks targeted at CHF. Cellular automata (CA) are a class of Boolean functions that exhibit good cryptographic properties and display a chaotic behavior. In this article, a new hash function based on CA is proposed. A description of the algorithm and the security measures to increase the robustness of the construction are presented. A security analysis against generic and dedicated attacks is included. It shows that the hashing algorithm has good security features and meet the security requirements of a good hashing scheme. The results of the tests and the properties of the CA used demonstrate the good statistical and cryptographic properties of the hash function. © Science and Information Organization.
引用
收藏
页码:502 / 510
页数:8
相关论文
共 50 条
  • [1] HCAHF: A New Family of CA-based Hash Functions
    Sadak, Anas
    Ziani, Fatima Ezzahra
    Echandouri, Bouchra
    Hanin, Charifa
    Omary, Fouzia
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 502 - 510
  • [2] CFA: A New Family of Hybrid CA-Based PRNGs
    Ziani, Fatima Ezzahra
    Sadak, Anas
    Hanin, Charifa
    Echandouri, Bouchra
    Omary, Fouzia
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] New Architectural Design of CA-Based Codec
    Bhaumik, Jaydeb
    Chowdhury, Dipanwita Roy
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2010, 18 (07) : 1139 - 1144
  • [4] CONSTRUCTION OF FAMILY OF HASH FUNCTIONS BASED ON IDEAL LATTICE
    Guritman, Sugi
    Aliatiningtyas, Nur
    Wulandari, Teduh
    Ilyas, Muhammad
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2015, 36 (02): : 177 - 188
  • [5] A family of fast syndrome based cryptographic hash functions
    Augot, D
    Finiasz, M
    Sendrier, N
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 64 - 83
  • [6] A New Family of Universal Hash Functions for Quantum Key Distribution
    Yang, Shuying
    International Journal of Network Security, 2023, 25 (06) : 1059 - 1063
  • [7] Hamsi-based parametrized family of hash-functions
    Ermakov, Kirill Dmitrievich
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (01) : 11 - 24
  • [8] Hamsi-based parametrized family of hash-functions
    Kirill Dmitrievich Ermakov
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 11 - 24
  • [9] Cryptanalysis of the ESSENCE Family of Hash Functions
    Mouha, Nicky
    Sekar, Gautham
    Aumasson, Jean-Philippe
    Peyrin, Thomas
    Thomsen, Soren S.
    Turan, Meltem Soenmez
    Preneel, Bart
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 15 - +
  • [10] Cryptanalysis of the HaF Family of Hash Functions
    Buczek, Mateusz
    Kontak, Marcin
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,