Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function

被引:0
|
作者
Hlobaz, Artur [1 ]
机构
[1] Univ Lodz, Fac Phys & Appl Informat, Pomorska 149-153, PL-90236 Lodz, Poland
关键词
secure communication; data encryption; data security; secure transmission; secure data exchange method; SDEx method; end-to-end data security; NIST Statistical Test Suite;
D O I
10.1109/lcn44214.2019.8990714
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper, the author provides a statistical analysis of the enhanced SDEx method based on SHA-256 hash function, which is used to secure end-to-end encryption in data transferring. To examine the quality of the enhanced SDEx encryption algorithm, the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. In addition, compression tests on ciphertext files were performed using the WinRAR software.
引用
收藏
页码:238 / 241
页数:4
相关论文
共 50 条
  • [31] Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm
    Rahul, B.
    Kuppusamy, K.
    Senthilrajan, A.
    INFORMATION SECURITY JOURNAL, 2024, 33 (03): : 226 - 250
  • [32] A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash
    Zhang, Xiaoyong
    Wu, Ruizhen
    Wang, Mingming
    Wang, Lin
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 52 - 55
  • [33] Blockchain Based Email Communication with SHA-256 Algorithm
    Beevi, L. Sherin
    Vijayalakshmi, R.
    Ilampiray, P.
    Priya, K. Hema
    UBIQUITOUS INTELLIGENT SYSTEMS, 2022, 302 : 455 - 466
  • [34] Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs
    Ahmad, I
    Das, AS
    COMPUTERS & ELECTRICAL ENGINEERING, 2005, 31 (06) : 345 - 360
  • [35] Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL
    Bensalem, Hachem
    Blaquiere, Yves
    Savaria, Yvon
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [36] Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures
    Michail, Harris E.
    Athanasiou, George S.
    Theodoridis, George
    Gregoriades, Andreas
    Goutis, Costas E.
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 45 : 227 - 240
  • [37] A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map
    Panwar, Kirtee
    Purwar, Ravindra Kumar
    Srivastava, Garima
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (02)
  • [38] Implementation of Efficient SHA-256 Hash Algorithm for Secure Vehicle Communication using FPGA
    Jeong, Chanbok
    Kim, Youngmin
    2014 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2014, : 224 - 225
  • [39] HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
    Kammoun, Manel
    Elleuchi, Manel
    Abid, Mohamed
    Obeid, Abdulfattah M.
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2021, 17 (02) : 87 - 96
  • [40] Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs
    Michail, Harris E.
    Athanasiou, George S.
    Kelefouras, Vasileios I.
    Theodoridis, George
    Stouraitis, Thanos
    Goutis, Costas E.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (04)