Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function

被引:0
|
作者
Hlobaz, Artur [1 ]
机构
[1] Univ Lodz, Fac Phys & Appl Informat, Pomorska 149-153, PL-90236 Lodz, Poland
关键词
secure communication; data encryption; data security; secure transmission; secure data exchange method; SDEx method; end-to-end data security; NIST Statistical Test Suite;
D O I
10.1109/lcn44214.2019.8990714
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper, the author provides a statistical analysis of the enhanced SDEx method based on SHA-256 hash function, which is used to secure end-to-end encryption in data transferring. To examine the quality of the enhanced SDEx encryption algorithm, the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. In addition, compression tests on ciphertext files were performed using the WinRAR software.
引用
收藏
页码:238 / 241
页数:4
相关论文
共 50 条
  • [1] Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function
    Hlobaz, Artur
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [2] The Evaluation Report of SHA-256 Crypt Analysis Hash Function
    Selvakumar, A. Arul Lawrence
    Ganandhas, C. Suresh
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 588 - +
  • [3] A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256
    Zhu, Shuqin
    Zhu, Congxu
    Wang, Wenhong
    ENTROPY, 2018, 20 (09)
  • [4] An Optimized Pipelined Architecture of SHA-256 Hash Function
    Padhi, Meelu
    Chaudhari, Ravindra
    2017 7TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED), 2017,
  • [5] Design of High-Throughput SHA-256 Hash Function based on FPGA
    Suhaili, Shamsiah Binti
    Watanabe, Takahiro
    PROCEEDINGS OF THE 2017 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI'17), 2017,
  • [6] Low power and high throughput implementation of SHA-256 Hash function
    Michail, H. E.
    Kakarountas, A. P.
    Milidonis, A.
    Goutis, C. E.
    International E-Conference on Computer Science 2005, 2005, 2 : 170 - 173
  • [7] Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
    B. Rahul
    K. Kuppusamy
    A. Senthilrajan
    Multimedia Tools and Applications, 2023, 82 : 43729 - 43758
  • [8] Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
    Rahul, B.
    Kuppusamy, K.
    Senthilrajan, A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (28) : 43729 - 43758
  • [9] Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function
    Rahul B.
    Kuppusamy K.
    Senthilrajan A.
    Optik, 2023, 289
  • [10] Efficient FPGA Hardware Implementation of Secure Hash Function SHA-256/Blake-256
    Kahri, Fatma
    Mestiri, Hassen
    Bouallegue, Belgacem
    Machhout, Mohsen
    2015 IEEE 12TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2015,