Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function

被引:0
|
作者
Hlobaz, Artur [1 ]
机构
[1] Univ Lodz, Fac Phys & Appl Informat, Pomorska 149-153, PL-90236 Lodz, Poland
关键词
secure communication; data encryption; data security; secure transmission; secure data exchange method; SDEx method; end-to-end data security; NIST Statistical Test Suite;
D O I
10.1109/lcn44214.2019.8990714
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper, the author provides a statistical analysis of the enhanced SDEx method based on SHA-256 hash function, which is used to secure end-to-end encryption in data transferring. To examine the quality of the enhanced SDEx encryption algorithm, the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. In addition, compression tests on ciphertext files were performed using the WinRAR software.
引用
收藏
页码:238 / 241
页数:4
相关论文
共 50 条
  • [11] The design of a high speed ASIC unit for the hash function SHA-256 (3849512)
    Dadda, L
    Macchetti, M
    Owen, J
    DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2004, : 70 - 75
  • [12] A Power-efficient Implementation of SHA-256 Hash Function for Embedded Applications
    Binh Kieu-Do-Nguyen
    Trong-Thuc Hoang
    Cong-Kha Pham
    Cuong Pham-Quoc
    2021 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2021), 2021, : 39 - 44
  • [13] A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
    Wu, Junfeng
    Zhang, Jialu
    Liu, Dong
    Wang, Xiaofeng
    ENTROPY, 2023, 25 (06)
  • [14] Analysis of a SHA-256 variant
    Yoshida, H
    Biryukov, A
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 245 - 260
  • [15] Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
    Hlobaz, Artur
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (01) : 57 - 62
  • [16] A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
    Garcia, Rommel
    Algredo-Badillo, Ignacio
    Morales-Sandoval, Miguel
    Feregrino-Uribe, Claudia
    Cumplido, Rene
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) : 194 - 202
  • [17] Model-driven Design & Synthesis of the SHA-256 Cryptographic Hash Function in ReWire
    Harrison, William L.
    Procter, Adam M.
    Allwein, Gerard
    PROCEEDINGS OF THE 2016 27TH INTERNATIONAL SYMPOSIUM ON RAPID SYSTEM PROTOTYPING (RSP): SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2016, : 114 - 120
  • [18] A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps
    Aqeel-ur-Rehman
    Liao, Xiaofeng
    Kulsoom, Ayesha
    Ullah, Sami
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 11241 - 11266
  • [19] A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps
    Xiaofeng Aqeel-ur-Rehman
    Ayesha Liao
    Sami Kulsoom
    Multimedia Tools and Applications, 2016, 75 : 11241 - 11266
  • [20] Security analysis of SHA-256 and sisters
    Gilbert, H
    Handschuh, H
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 175 - 193