A COLLISION RESISTANCE SECURE HASH ALGORITHM BASED ON A PSEUDO-RANDOM SEQUENCE GENERATOR FOR AUTHENTICATION PROTOCOL

被引:0
|
作者
Yousuf, Ahmed Y. [1 ]
Atia, Tayseer S. [2 ]
机构
[1] Al Mansour Univ Coll, Comp Technol Engn Dept, Baghdad, Iraq
[2] Al Iraqia Univ, Coll Engn, Baghdad, Iraq
来源
关键词
Authentication protocol; Best resilient function; Collision Attack; LFSR; Pseudo-random generator; SHA-1; SSL Certificate;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ensuring integrity and authentication for data transfer are essential security goals that will be achieved using cryptography. In this context, the cryptographic hash algorithm was employed in many cryptographic applications and protocols such as digital signature, message authentication code, data source authentication, Secure Socket Layer and Pretty Good Privacy. An efficient security algorithm requires continuous maintenance to fix the vulnerability exploited by an attacker to launch an actualized threat. The prefix collision attack was a successful attack against SHA-1 that took place in January 2020 which exploited the weak point in the algorithm design. As a consequence of this attack, some authentication protocols rejected the certificates that were signed with SHA-1. This paper introduces a randomization principle to control the threats against SHA-1. Randomization is achieved by a pseudo-random sequence generator which consists of Linear Feed Back Register and Best Resilient Function. The pseudo-random sequence operation of the improved algorithm receives an input binary sequence of length 128-bit and produces an arbitrary binary output with good randomness properties. The proposed algorithm works in two modes. The SHA1-Tight in which the proposed operation is utilized in the message expansion stage, and the compression function. While in the SHA1-Light, the SRS is implemented in the message expansion step only. In the test scenarios, SHA1-Tight passes tests with the optimal value and demonstrates the algorithm efficiency for signing a certificate on the authentication protocol. The SHA1-Light passes tests with a result close to the optimal value and ensures message integrity. On the other hand, the obtained results from SHA-1 are disappointing The proposed works imply the effectiveness of utilizing randomness in designing hash algorithms to provide collision resistance.
引用
收藏
页码:2877 / +
页数:15
相关论文
共 50 条
  • [1] Pseudo-Random Sequence Generator Based on Random Selection of an Elliptic Curve
    Benssalah, Mustapha
    Djeddou, Mustapha
    Drouiche, Karim
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2015,
  • [3] Pseudo-random sequence generator based on the generalized Henon map
    College of Electronic Science and Engineering, Jilin University, Changchun, 130012, China
    J. China Univ. Post Telecom., 2008, 3 (64-68):
  • [4] PSEUDO-RANDOM BIT-SEQUENCE GENERATOR
    SPENCER, TW
    ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1650): : 303 - 303
  • [5] Combined Pseudo-Random Sequence Generator for Cybersecurity
    Maksymovych, Volodymyr
    Shabatura, Mariia
    Harasymchuk, Oleh
    Shevchuk, Ruslan
    Sawicki, Pawel
    Zajac, Tomasz
    SENSORS, 2022, 22 (24)
  • [6] Hybrid Cryptographically Secure Pseudo-Random Bit Generator
    Kumar, Mahesh K. M.
    Sunitha, N. R.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 296 - 301
  • [7] An implementation of chaotic pseudo-random sequence generator based on pipelined architecture
    Feng, Kai
    Huang, Xin
    Chu, Shu-Chuan
    Roddick, John F.
    Ding, Qun
    Journal of Network Intelligence, 2019, 4 (02): : 71 - 79
  • [8] A self-perturbed pseudo-random sequence generator based on hyperchaos
    Zhao Y.
    Gao C.
    Liu J.
    Dong S.
    Chaos, Solitons and Fractals: X, 2019, 4
  • [9] A Pseudo-Random Generator Whose Output is a Normal Sequence
    Ryabko, Boris
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2021, 32 (08) : 981 - 989
  • [10] Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm
    Baldanzi, Luca
    Crocetti, Luca
    Falaschi, Francesco
    Bertolucci, Matteo
    Belli, Jacopo
    Fanucci, Luca
    Saponara, Sergio
    SENSORS, 2020, 20 (07)