Analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method

Artur Jan Hłobaż

Abstract


The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA-512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.

Full Text:

PDF

References


Chang, S. H., Ray A. Perlner, W. Burr, M. Turan, J. Kelsey, S. Paul and Lawrence E. Bassham. “Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.” (2012), http://dx.doi.org/10.6028/NIST.IR.7896.

Preneel B., Davies-Meyer hash function. In van Tilborg, H.C.A., ed.: Encyclopedia of Cryptography and Security, Boston, MA, pp. 136-146, Springer US, 2005.

National Institute of Standards and Technology: Secure hash standard (shs). Technical report, NIST, 2008.

https://www.cryptopp.com/benchmarks.html

Aumasson JP., Meier W., Phan R.CW., Henzen L. (2014) Specification of BLAKE. In: The Hash Function BLAKE. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44757-4_3

Grøstl documentation: https://www.groestl.info/groestl-implementation-guide.pdf

JH documentation: https://www3.ntu.edu.sg/home/wuhj/research/jh/jh_round3.pdf

Keccak documentation: https://keccak.team/keccak_specs_summary.html

Skein documentation: https://www.schneier.com/wp-content/uploads/2015/01/skein.pdf

BLAKE2 documentation: https://www.blake2.net/blake2.pdf

O’Connor J., Aumasson J.-P., Neves S., Wilcox-O’Hearn Z, BLAKE3 one function, fast everywhere: https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf

I. F. Alshaikhli, M. A. Alahmad and K. Munthir, "Comparison and Analysis Study of SHA-3 Finalists," 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, 2012, pp. 366-371, doi: 10.1109/ACSAT.2012.64.

D. Bernstein and T. Lange (editors), eBASH: ECRYPT Benchmarking of All Submitted Hashes, http://bench.cr.yp.to/ebash.html

External Benchmarking Extension (XBX), http://xbx.das-labor.org/trac

Announcing Approval of Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, and Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard:

https://www.federalregister.gov/documents/2015/08/05/2015-19181/announcing-approval-of-federal-information-processing-standard-fips-202-sha-3-standard


Refbacks

  • There are currently no refbacks.


International Journal of Electronics and Telecommunications
is a periodical of Electronics and Telecommunications Committee
of Polish Academy of Sciences

eISSN: 2300-1933