Triple-block-chaining-based hash function and its performance analysis

被引:0
|
作者
Research Center of Information Security, Southeast University, Nanjing 210096, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 8卷 / 1398-1404期
关键词
Entropy - Evaluation - Matrix algebra - Statistical tests;
D O I
10.1360/crad20060813
中图分类号
学科分类号
摘要
A hash function based on triple-block chaining (HTBC) is put forward and its security is demonstrated. The speed of the HTBC algorithm is faster than that of hash functions in common use (SHA and MD family). The dependence test results accord with the demands. The HTBC algorithm is complete; its degree of avalanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the HTBC algorithm has uniformity. The binary matrix rank test results indicate that it is linear independent among disjoint sub-matrices of the output. Maurer's universal statistical test results show that the output could be significantly compressed without loss of information. The results of run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test, and random excursions variant test all fulfill the requirements. Therefore the output generated by the HTBC algorithm has good pseudo-randomness. Thus the security of the HTBC algorithm is verified by way of statistical evaluation.
引用
收藏
相关论文
共 50 条
  • [1] Security considerations for incremental hash functions based on pair block chaining
    Phan, RCW
    Wagner, D
    COMPUTERS & SECURITY, 2006, 25 (02) : 131 - 136
  • [2] Hash function based on block cipher
    Yi, X
    Lam, KY
    ELECTRONICS LETTERS, 1997, 33 (23) : 1938 - 1940
  • [3] A new hash function based on block cipher
    Yi, X
    Lam, KY
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 139 - 146
  • [4] Parallel hash function based on block cipher
    Du, Maokang
    He, Bo
    Wang, Yong
    Wu, JianJun
    Xiao, Di
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 55 - +
  • [5] Analysis of the Cryptographic Hash function in block chains and its impact on the security of data transactions
    Diaz Gutierrez, Yesid
    Cueva Lovelle, Juan Manuel
    REDES DE INGENIERIA-ROMPIENDO LAS BARRERAS DEL CONOCIMIENTO, 2018, 9 (02): : 82 - 87
  • [6] One-way hash function based on integer coupled tent maps and its performance analysis
    Department of Information Engineering, Beijing Institute of Petro-Chemical Technology, Beijing 102617, China
    Jisuanji Yanjiu yu Fazhan, 2008, 3 (563-569):
  • [7] Design and Performance Analysis of a SPECK-Based Lightweight Hash Function
    Sevin, Abdullah
    Cavusoglu, Unal
    ELECTRONICS, 2024, 13 (23):
  • [8] HeW: A Hash Function based on Lightweight Block Cipher FeW
    Kumar, Manoj
    Dey, Dhananjoy
    Pal, S. K.
    Panigrahi, Anupama
    DEFENCE SCIENCE JOURNAL, 2017, 67 (06) : 636 - 644
  • [9] Improvement and performance analysis of a novel hash function based on chaotic neural network
    Yantao Li
    Di Xiao
    Shaojiang Deng
    Gang Zhou
    Neural Computing and Applications, 2013, 22 : 391 - 402
  • [10] Improvement and performance analysis of a novel hash function based on chaotic neural network
    Li, Yantao
    Xiao, Di
    Deng, Shaojiang
    Zhou, Gang
    NEURAL COMPUTING & APPLICATIONS, 2013, 22 (02): : 391 - 402