2022
DOI: 10.15587/1729-4061.2022.252060
|View full text |Cite
|
Sign up to set email alerts
|

Development and analysis of the new hashing algorithm based on block cipher

Abstract: This paper proposes the new hash algorithm HBC-256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construct. To transform the block cipher CF into a one-way compression function, the Davis-Meyer scheme is used, which, according to the results of research, is recognized as a strong and secure scheme for constructing hash functions based on block ciphers. The symmetric C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The hash-based on block cipher (HBC-256) hashing algorithm is new and belongs to the class of new hash functions. A detailed description of the algorithm and some approaches to its analysis are presented in [21]. The HBC-256 hash function is built on the Merkle-Damgard construction.…”
Section: Methods 21 Hbc-256 Hash Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…The hash-based on block cipher (HBC-256) hashing algorithm is new and belongs to the class of new hash functions. A detailed description of the algorithm and some approaches to its analysis are presented in [21]. The HBC-256 hash function is built on the Merkle-Damgard construction.…”
Section: Methods 21 Hbc-256 Hash Functionmentioning
confidence: 99%
“…After all, three blocks have been processed, they are shuffled and the first 256 bits form the desired hash value. If the length of the original message is less than 384 bits, then the message is padded as described in [21]. For Stage-1 and Stage-3 operations, data is represented as a 4×4 matrix, where each element of the matrix is one byte.…”
Section: Methods 21 Hbc-256 Hash Functionmentioning
confidence: 99%
“…For the Syrga-1 algorithm, we consider the variant where l = 4, making the hash value size 256 bits. A full mathematical description of the HAS01 hashing algorithm, as well as its security and efficiency analysis, can be found in references [23,24], where it is demonstrated to meet all the properties and requirements expected of hash functions, showing excellent performance in all aspects.…”
Section: Hashing Algorithm Has01mentioning
confidence: 99%
“…The development of this hashing algorithm offers significant flexibility in selecting input block sizes and output hash digests. This adaptability enables the creation of a versatile hashing algorithm applicable across various cryptographic protocols and electronic digital signature schemes [25].…”
Section: Hash-based Cryptographymentioning
confidence: 99%