Triple-block-chaining-based hash function and its performance analysis

被引:0
|
作者
Research Center of Information Security, Southeast University, Nanjing 210096, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 8卷 / 1398-1404期
关键词
Entropy - Evaluation - Matrix algebra - Statistical tests;
D O I
10.1360/crad20060813
中图分类号
学科分类号
摘要
A hash function based on triple-block chaining (HTBC) is put forward and its security is demonstrated. The speed of the HTBC algorithm is faster than that of hash functions in common use (SHA and MD family). The dependence test results accord with the demands. The HTBC algorithm is complete; its degree of avalanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the HTBC algorithm has uniformity. The binary matrix rank test results indicate that it is linear independent among disjoint sub-matrices of the output. Maurer's universal statistical test results show that the output could be significantly compressed without loss of information. The results of run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test, and random excursions variant test all fulfill the requirements. Therefore the output generated by the HTBC algorithm has good pseudo-randomness. Thus the security of the HTBC algorithm is verified by way of statistical evaluation.
引用
收藏
相关论文
共 50 条
  • [21] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [22] Improved Dynamic S-Box generation using Hash function for AES and its Performance Analysis
    Manjula, G.
    Mohan, H. S.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 109 - 115
  • [23] Black-box analysis of the block-cipher-based hash-function constructions from PGV
    Black, J
    Rogaway, P
    Shrimpton, T
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 320 - 335
  • [24] Analysis of E-commerce Information Ecosystem Model Based on Block Chaining
    Deng, Pan
    Zhong, Jing
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 86 - 88
  • [25] A new black box analysis of hash functions based on block ciphers
    Da L.
    Duo L.
    Henricksen M.
    Li C.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (6) : 664 - 669
  • [26] A New Black Box Analysis of Hash Functions Based on Block Ciphers
    达林
    多磊
    Matt Henricksen
    李超
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 664 - 669
  • [27] Chaotic Hash Function Based Plain-Image Dependent Block Ciphering Technique
    Wadhwa, Sahil
    Ahmad, Musheer
    Vijay, Harsh
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 633 - 637
  • [28] Performance Analysis of Zigzag Map and Hash Function to Generate Random Number
    Magfirawaty
    Suryadi, M. T.
    Ramli, Kalamullah
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICELTICS), 2017, : 297 - 301
  • [29] Analysis and improvement of a chaos-based Hash function construction
    Deng, Shaojiang
    Li, Yantao
    Xiao, Di
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (05) : 1338 - 1347
  • [30] Design and Analysis on a Parallel Chaos-Based Hash Function
    Liu, Zhuo
    Wang, Yong
    Jiang, Gongkun
    Zhang, Leo Yu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (13):