Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function

被引:0
|
作者
Hlobaz, Artur [1 ]
机构
[1] Univ Lodz, Fac Phys & Appl Informat, Pomorska 149-153, PL-90236 Lodz, Poland
关键词
secure communication; data encryption; data security; secure transmission; secure data exchange method; SDEx method; end-to-end data security; NIST Statistical Test Suite;
D O I
10.1109/lcn44214.2019.8990714
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper, the author provides a statistical analysis of the enhanced SDEx method based on SHA-256 hash function, which is used to secure end-to-end encryption in data transferring. To examine the quality of the enhanced SDEx encryption algorithm, the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. In addition, compression tests on ciphertext files were performed using the WinRAR software.
引用
收藏
页码:238 / 241
页数:4
相关论文
共 50 条
  • [41] A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256
    Suman, Rajiv Ranjan
    Mondal, Bhaskar
    Mandal, Tarni
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (19) : 27089 - 27110
  • [42] A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256
    Rajiv Ranjan Suman
    Bhaskar Mondal
    Tarni Mandal
    Multimedia Tools and Applications, 2022, 81 : 27089 - 27110
  • [43] Symmetric Chaos-Based Image Encryption Technique on Image Bit-Planes using SHA-256
    Bhadke, Abhilash Ashok
    Kannaiyan, Surender
    Kamble, Vipin
    2018 TWENTY FOURTH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2018,
  • [44] Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
    Vaughn, Riley
    Borowczak, Mike
    CRYPTOGRAPHY, 2024, 8 (03)
  • [45] Designing a SHA-256 processor for blockchain-based IoT applications
    Martino, Raffaele
    Cilardo, Alessandro
    INTERNET OF THINGS, 2020, 11
  • [46] Analysis of Enhanced SDEx Method
    Milczarski, Piotr
    Hlobaz, Artur
    Podlaski, Krzysztof
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, : 1046 - 1050
  • [47] A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms
    Aydin, Yilmaz
    Garipcan, Ali Murat
    Ozkaynak, Fatih
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, : 1247 - 1260
  • [48] Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
    Kuwakado, Hidenori
    Hirose, Shoichi
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 174 - +
  • [49] T-depth reduction method for efficient SHA-256 quantum circuit construction
    Lee, Jongheon
    Lee, Sokjoon
    Lee, You-Seok
    Choi, Dooho
    IET INFORMATION SECURITY, 2023, 17 (01) : 46 - 65
  • [50] Multi-core and SIMD Architecture Based Implementation on SHA-256 of Blockchain
    Fan, Xing
    Niu, Baoning
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCC 2020, 2021, 1305 : 50 - 65