Design and Performance Analysis of a SPECK-Based Lightweight Hash Function

被引:1
|
作者
Sevin, Abdullah [1 ]
Cavusoglu, Unal [1 ]
机构
[1] Sakarya Univ, Dept Comp Engn, TR-54050 Sakarya, Turkiye
来源
ELECTRONICS | 2024年 / 13卷 / 23期
关键词
information security; lightweight algorithm; security tests; performance analysis; hashing; BLOCKCHAIN; EFFICIENT; CIPHER;
D O I
10.3390/electronics13234767
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, hash algorithms have been used frequently in many areas, such as digital signature, blockchain, and IoT applications. Standard cryptographic hash functions, including traditional algorithms such as SHA-1 and MD5, are generally computationally intensive. A principal approach to improving the security and efficiency of hash algorithms is the integration of lightweight algorithms, which are designed to minimize computational overhead, into their architectural framework. This article proposes a new hash algorithm based on lightweight encryption. A new design for the lightweight hash function is proposed to improve its efficiency and meet security requirements. In particular, efficiency reduces computational load, energy consumption, and processing time for resource-constrained environments such as IoT devices. Security requirements focus on ensuring properties such as collision resistance, pre-image resistance, and distribution of modified bit numbers to ensure reliable performance while preserving the robustness of the algorithm. The proposed design incorporates the SPECK lightweight encryption algorithm to improve the structure of the algorithm, ensuring robust mixing and security through confusion and diffusion, while improving processing speed. Performance and efficiency tests were conducted to evaluate the proposed algorithm, and the results were compared with commonly used hash algorithms in the literature. The test results show that the new lightweight hash algorithm has successfully passed security tests, including collision resistance, pre-image resistance, sensitivity, and distribution of hash values, while outperforming other commonly used algorithms regarding execution time.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Design of Lightweight Hash Function based on Iterate
    Gao, Shujing
    Zhang, Ruiquan
    Zhang, Wei
    APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 786 - 789
  • [2] SPECK-based lossless multispectral image coding
    Khelifi, Fouad
    Kurugollu, Fatih
    Bouridane, Ahmed
    IEEE SIGNAL PROCESSING LETTERS, 2008, 15 : 69 - 72
  • [3] Spinal code based on lightweight hash function
    Wang, Lina
    Li, Xinran
    ARCHIVES OF ELECTRICAL ENGINEERING, 2019, 68 (03) : 595 - 609
  • [4] SPONGENT: A Lightweight Hash Function
    Bogdanov, Andrey
    Knezevic, Miroslav
    Leander, Gregor
    Toz, Deniz
    Varici, Kerem
    Verbauwhede, Ingrid
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 312 - +
  • [5] LHash: A Lightweight Hash Function
    Wu, Wenling
    Wu, Shuang
    Zhang, Lei
    Zou, Jian
    Dong, Le
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 291 - 308
  • [6] Hash-One: a lightweight cryptographic hash function
    Mukundan, Puliparambil Megha
    Manayankath, Sindhu
    Srinivasan, Chungath
    Sethumadhavan, Madathil
    IET INFORMATION SECURITY, 2016, 10 (05) : 225 - 231
  • [7] Design and Analysis on a Parallel Chaos-Based Hash Function
    Liu, Zhuo
    Wang, Yong
    Jiang, Gongkun
    Zhang, Leo Yu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (13):
  • [8] Design and Analysis of Hash Function Based on Spark and Chaos System
    Liu, Jiandong
    Liu, Yujie
    Li, Bo
    International Journal of Network Security, 2023, 25 (03) : 456 - 467
  • [9] A Lightweight Hash Function based on Cellular Automata for Mobile Network
    Zhang, Xing
    Xu, Qinbao
    Li, Xiaowei
    Wang, Changda
    2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019), 2019, : 247 - 252
  • [10] A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
    Cao, Fang-Ming
    Liu, Dao-Wei
    International Journal of Network Security, 2022, 24 (03): : 436 - 443