Triple-block-chaining-based hash function and its performance analysis

被引:0
|
作者
Research Center of Information Security, Southeast University, Nanjing 210096, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2006年 / 8卷 / 1398-1404期
关键词
Entropy - Evaluation - Matrix algebra - Statistical tests;
D O I
10.1360/crad20060813
中图分类号
学科分类号
摘要
A hash function based on triple-block chaining (HTBC) is put forward and its security is demonstrated. The speed of the HTBC algorithm is faster than that of hash functions in common use (SHA and MD family). The dependence test results accord with the demands. The HTBC algorithm is complete; its degree of avalanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the HTBC algorithm has uniformity. The binary matrix rank test results indicate that it is linear independent among disjoint sub-matrices of the output. Maurer's universal statistical test results show that the output could be significantly compressed without loss of information. The results of run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test, and random excursions variant test all fulfill the requirements. Therefore the output generated by the HTBC algorithm has good pseudo-randomness. Thus the security of the HTBC algorithm is verified by way of statistical evaluation.
引用
收藏
相关论文
共 50 条
  • [31] Design and Analysis of Hash Function Based on Spark and Chaos System
    Liu, Jiandong
    Liu, Yujie
    Li, Bo
    International Journal of Network Security, 2023, 25 (03) : 456 - 467
  • [32] Efficient vehicle ownership identification scheme based on triple-trapdoor chameleon hash function
    Lin, Dai-Rui
    Wang, Chih-I
    Guan, D. J.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 12 - 19
  • [33] A synthetic indifferentiability analysis of some block-cipher-based hash functions
    Zheng Gong
    Xuejia Lai
    Kefei Chen
    Designs, Codes and Cryptography, 2008, 48 : 293 - 305
  • [34] A synthetic indifferentiability analysis of some block-cipher-based hash functions
    Gong, Zheng
    Lai, Xuejia
    Chen, Kefei
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 293 - 305
  • [35] Collision of one keyed hash function based on chaotic map and analysis
    Shandong Computer Science Center, Jinan 250014, China
    不详
    Wuli Xuebao, 2008, 5 (2737-2742):
  • [36] Collision analysis of one kind of chaos-based hash function
    Xiao, Di
    Peng, Wenbing
    Liao, Xiaofeng
    Xiang, Tao
    PHYSICS LETTERS A, 2010, 374 (10) : 1228 - 1231
  • [37] Collision analysis and improvement of a hash function based on chaotic tent map
    Li, Yantao
    OPTIK, 2016, 127 (10): : 4484 - 4489
  • [38] The collision of one keyed hash function based on chaotic map and analysis
    Wang Ji-Zhi
    Wang Mei-Qin
    Wang Ying-Long
    ACTA PHYSICA SINICA, 2008, 57 (05) : 2737 - 2742
  • [39] Finding Collisions in Block Cipher-based Iterative Hash Function Schemes Using Iterative Differential
    Susanti, Bety Hayat
    Ilahi, Mohammad Heading Nor
    Amiruddin, Amiruddin
    Carita, Sa'aadah Sajjana
    Susanti, Bety Hayat, 1600, International Association of Engineers (48): : 1 - 12
  • [40] Image block generation from block-based SMRT in colour image encryption and its performance analysis
    Ikbal, Febina
    Gopikakumari, Rajamma
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8459 - 8477