A DUAL-ARCHITECTURE HASHING FRAMEWORK WITH INTERLEAVED BLOCK MIXING FOR ENHANCED SECURITY AND ENTROPY

Authors: Vedant Pillai
Affiliation: K J Somaiya Institute of Technology

Category:

Keywords: Hybrid hash, Cryptographic functions, Entropy enhancement, Block mixing, MD5 replacement, Dual architecture, Secure hashing, Software Security
ABSTRACT. Hash functions are used to ensure integrity and confidentiality of sensitive data. They are crucial to ensure that even if sensitive data is leaked, it would be in a non-readable and non-exploitable format. From a security perspective, hash functions can be divided into 2 types - Cryptographic Hash Functions and Non-Cryptographic Hash Functions. Cryptographic hash functions are primarily used in applications that demand security such as digital signatures, certificate verification and password storage. Over the years, many cryptographic hash functions like MD5, SHA-1, SHA-256, BLAKE2 and RIPEMD-160 have been introduced to provide enhanced security. MD5 (Message Digest 5), once a widely used hashing algorithm, is now deprecated due to the presence of collision and preimage attacks. Despite its deprecation, it is still used in many applications due to its simplicity and performance efficiency. Non-Cryptographic hash functions are commonly employed in applications where the primary goal is not security but speed and performance of the application. xxHash is a non-cryptographic hash function which is known for being extremely fast, working at RAM speed limits. It is widely used for non-security tasks like checksums and indexing. Thus, in this paper, a hybrid hashing algorithm is proposed which integrates the legacy compatibility of MD5 with the speed and entropy characteristics of xxHash. The proposed system can be used in applications requiring improved security while not decreasing their performance.

References:

“xxHash - Extremely Fast Non-cryptographic Hash Algorithm,” n.d. https://xxhash.com/.
R, Samundi, Gunanidhi G S, and Karthikeyan R. “Cyber Security and Dual Hash Mechanism for Cloud-Based Internet of Transportation System.” 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), November 22, 2023, 1519–21. https://doi.org/10.1109/iceca58529.2023.10394985
Yao, Xiaosong, Ran Liu, Runan Yang, Wen Liu, You Xue, Shengbiao Cao, and Zhigang Wang. Research and Improvement of Secure Hash Algorithm Based on MD5. 2023 4th International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE). IEEE, 2023. https://doi.org/10.1109/icbaie59714.2023.10281223
Zhuoyu, Han, and Li Yongzhen. “Design and Implementation of Efficient Hash Functions.” 2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA) 1 (January 21, 2022): 1240–43. https://doi.org/10.1109/icpeca53709.2022.9719176
Mahajan, Rahul, and Rajeev Bedi. “Reducing Duplicate Content Using XXHASH Algorithm.” International Journal of Science and Research (IJSR) (Vol.3, No. 7), January 1, 2014. https://www.ijsr.net/archive/v3i7/MDIwMTQ5NTE=.pdf
Kumar, Umesh, and V. Ch. Venkaiah. “A New Modified MD5-224 Bits Hash Function and an Efficient Message Authentication Code Based on Quasigroups.” In Lecture Notes in Networks and Systems, 1–12, 2022. https://doi.org/10.1007/978-981-16-8664-1_1
K, Kavin Kumar, Nandhini V D, Kowsalya M, Ragu P J, Raghapriya N R, and Maheswaran S. “Designing and Validating an MD5 Hash Algorithm Using the UVM Verification Framework and Checkers.” 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT), July 6, 2023. https://doi.org/10.1109/icccnt56998.2023.10307798
Kumar, K. Kranthi, E. Ramaraj, B. Srikanth, A. Srinivasa Rao, and Pbvn Prasad. “Role of MD5 Message-Digest Algorithm for Providing Security to Low-Power Devices.” 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), May 25, 2022, 352–58. https://doi.org/10.1109/iciccs53718.2022.9788249
Shaikh, Mohammad Shahnawaz, Aparajita Biswal, Akruti Pandwal, Nilesh Khodifad, and Bhavesh Vaghela. “Image Forgery Detection Using MD5 & Open CV.” 2024 International Conference on Emerging Research in Computational Science (ICERCS), December 12, 2024, 1–8. https://doi.org/10.1109/icercs63125.2024.10895348
“Peter Selinger: MD5 Collision Demo,” n.d. https://www.mscs.dal.ca/~selinger/md5collision