STATISTICAL ANALYSIS OF THE HAS03 HASH FUNCTION BASED ON THE SPONGE STRUCTURE
ავტორი: K.T. Algazy, K.S. Sakan, D.S. Dyusenbayev
ორგანიზაცია: Institute of Information and Computing Technologies
კატეგორია:
საკვანძო სიტყვები: hash function, sponge, NIST test suite, cryptographic avalanche effect
აბსტრაქტი. This work focuses on the statistical analysis of the HAS03 hash function, which is based on the Sponge structure. The algorithm involves defining a fixed-length internal state and includes the absorption and squeezing phases. The paper presents the results of statistical testing of the cryptographic hash function. The analysis was performed using the software implementation of the statistical test suite recommended by the U.S. National Institute of Standards and Technology (NIST). Additionally, one of the key requirements for cryptographic hash algorithms is the presence of the avalanche effect. The results of the analysis confirm that the sequences produced by this hashing algorithm fully meet the criteria for the avalanche effect and exhibit a high level of statistical security.
ბიბლიოგრაფია
Farshim, Pooya, and Stefano Tessaro. "Password Hashing and Preprocessing." In Advances in Cryptology – EUROCRYPT 2021, edited by Anne Canteaut and François-Xavier Standaert, vol. 12697 of Lecture Notes in Computer Science. Cham: Springer, 2021.
Chilambarasan, N. R., and A. Kangaiammal. "Matyas–Meyer–Oseas Skein Cryptographic Hash Blockchain-Based Secure Access Control for E-Learning in Cloud." In Inventive Systems and Control, edited by V. Suma, J. I. Z.
Chen, Zubair Baig, and Hui Wang, vol. 204 of Lecture Notes in Networks and Systems. Singapore: Springer, 2021. https://doi.org/10.1007/978-981-16-1395-1_65.
Peiser, S. C., L. Friborg, and R. Scandariato. "JavaScript Malware Detection Using Locality Sensitive Hashing." In ICT Systems Security and Privacy Protection, edited by Marko Hölbl, Kai Rannenberg, and Tomaž Welzer, vol. 580 of IFIP Advances in Information and Communication Technology. Cham: Springer, 2020. https://doi.org/10.1007/978-3-030-58201-2_10.
Rasool, M., and S. B. Belhaouari. "From Collatz Conjecture to Chaos and Hash Function." Chaos, Solitons & Fractals 176 (2023): 114103. https://doi.org/10.1016/j.chaos.2023.114103.
Hu, Ying, Guang Cheng, Yongning Tang, and Feng Wang. "A Practical Design of Hash Functions for IPv6 Using Multi-Objective Genetic Programming." Computer Communications 162 (2020): 160–68. https://doi.org/10.1016/j.comcom.2020.08.013.
Regenscheid, Andrew. "An Algebraic Hash Function Based on SL2." 2007. https://doi.org/10.31274/rtd-180813-15958.
Lee, D. "Hash Function Vulnerability Index and Hash Chain Attacks." In 2007 3rd IEEE Workshop on Secure Network Protocols, 1–6. Beijing, China: IEEE, 2007. https://doi.org/10.1109/NPSEC.2007.4371616.
Bouam, M., Christophe Bouillaguet, C. Delaplace, and C. Nous. "Computational Records with Aging Hardware: Controlling Half the Output of SHA-256." Parallel Computing 106 (2021): 102804. https://doi.org/10.1016/j.parco.2021.102804.
Luo, P., Y. Fei, L. Zhang, and A. A. Ding. "Differential Fault Analysis of SHA3-224 and SHA3-256." In 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 4–15. IEEE, 2016. https://doi.org/10.1109/FDTC.2016.17.
Levin, L. A. "The Tale of One-Way Functions." Problems of Information Transmission 39, no. 1 (2003): 92–103. https://doi.org/10.1023/A:1023634616182.
Beirendonck, M., L. Trudeau, P. Giard, and A. Balatsoukas-Stimming. "A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies." In IEEE International Symposium on Circuits and Systems (ISCAS), 1–5. Sapporo, Japan: IEEE, 2019. https://doi.org/10.1109/ISCAS.2019.8702498.
Upadhyay, D., N. Gaikwad, M. Zaman, and S. Sampalli. "Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications." IEEE Access 10 (2022): 112472–86. https://doi.org/10.1109/ACCESS.2022.3215778.
Zima, V. M. Security of Global Network Technologies. BHV-Petersburg, 2000.
Menu