Secure and fast hashing algorithm with multiple security levels

被引:1
|
作者
Elkamchouchi, Hassan M. [1 ]
Nasr, Mohammed [2 ]
Ismail, Roayat [2 ]
机构
[1] Faculty of Engineering, Alexandria, Egypt
[2] Faculty of Engineering, Tanta, Egypt
关键词
Compaction - Iterative methods;
D O I
10.4304/jsw.4.9.935-942
中图分类号
O24 [计算数学];
学科分类号
070102 ;
摘要
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction that one can achieve. The design principle of the proposed algorithm is to have variable output length of 128, 192 and 256 bits, variable number of compression functions, variable number of iterations in each compression function and variable compression function structure. The compression function used in this algorithm is more dynamic in the sense that the input controls what happen in the algorithm. This enable us to achieve a novel design principle: when message is changed, different shift rotations are done which causes more complexity for someone trying to create a collision. Instead of mixing a single word of a message block, four words are mixed per iteration which achieve faster data diffusion and hence better avalanching effect. There is no message expansion in the proposed scheme and it doesn't use Boolean functions but uses only addition, XOR and rotations to achieve its security. This in addition to increasing the algorithm efficiency, it distributes non-linearity among all blocks in a round. © 2009 Academy Publisher.
引用
收藏
页码:935 / 942
相关论文
共 50 条
  • [1] Anew secure and fast hashing algorithm (SFHA-256)
    Elkamchouchi, Hassan. M.
    Nasr, Mohamed E.
    Abdelfatah, Roayat Ismail
    PROCEEDINGS OF THE 25TH NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2008, 2008, : U497 - U504
  • [2] Fast and secure hashing based on codes
    Knudsen, L
    Preneel, B
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 485 - 498
  • [3] THERE IS NO FAST SINGLE HASHING ALGORITHM
    AJTAI, M
    KOMLOS, J
    SZEMEREDI, E
    INFORMATION PROCESSING LETTERS, 1978, 7 (06) : 270 - 273
  • [4] Fast Algorithm for Anchor Graph Hashing
    Fujiwara, Yasuhiro
    Kanai, Sekitoshi
    Ida, Yasutoshi
    Kumagai, Atsutoshi
    Ueda, Naonori
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2021, 14 (06): : 916 - 928
  • [5] Proofs of security for the Unix password hashing algorithm
    Wagner, D
    Goldberg, I
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 560 - 572
  • [6] Speeding Up the Wide-Pipe: Secure and Fast Hashing
    Nandi, Mridul
    Paul, Souradyuti
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 144 - +
  • [7] Enhanced and Fast Face Recognition by Hashing Algorithm
    Sharif, M.
    Ayub, K.
    Sattar, D.
    Raza, M.
    Mohsin, S.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2012, 10 (04) : 607 - 617
  • [8] Cancelable Multibiometrics Template Security Using Deep Binarization and Secure Hashing
    Singh, Ashutosh
    Singh, Yogendra Narain
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2023, 37 (05)
  • [9] MISSH: Fast Hashing of Multiple Spaced Seeds
    Mian, Eleonora
    Petrucci, Enrico
    Pizzi, Cinzia
    Comin, Matteo
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2024, 21 (06) : 2330 - 2339
  • [10] Verifiable speech retrieval algorithm based on KNN secure hashing
    An, Li
    Huang, Yi-bo
    Zhang, Qiu-yu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (05) : 7803 - 7824