Analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method

Authors

Abstract

The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA-512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.

References

Chang, S. H., Ray A. Perlner, W. Burr, M. Turan, J. Kelsey, S. Paul and Lawrence E. Bassham. “Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.” (2012), http://dx.doi.org/10.6028/NIST.IR.7896.

Preneel B., Davies-Meyer hash function. In van Tilborg, H.C.A., ed.: Encyclopedia of Cryptography and Security, Boston, MA, pp. 136-146, Springer US, 2005.

National Institute of Standards and Technology: Secure hash standard (shs). Technical report, NIST, 2008.

https://www.cryptopp.com/benchmarks.html

Aumasson JP., Meier W., Phan R.CW., Henzen L. (2014) Specification of BLAKE. In: The Hash Function BLAKE. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44757-4_3

Grøstl documentation: https://www.groestl.info/groestl-implementation-guide.pdf

JH documentation: https://www3.ntu.edu.sg/home/wuhj/research/jh/jh_round3.pdf

Keccak documentation: https://keccak.team/keccak_specs_summary.html

Skein documentation: https://www.schneier.com/wp-content/uploads/2015/01/skein.pdf

BLAKE2 documentation: https://www.blake2.net/blake2.pdf

O’Connor J., Aumasson J.-P., Neves S., Wilcox-O’Hearn Z, BLAKE3 one function, fast everywhere: https://github.com/BLAKE3-team/BLAKE3-specs/blob/master/blake3.pdf

I. F. Alshaikhli, M. A. Alahmad and K. Munthir, "Comparison and Analysis Study of SHA-3 Finalists," 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, 2012, pp. 366-371, doi: 10.1109/ACSAT.2012.64.

D. Bernstein and T. Lange (editors), eBASH: ECRYPT Benchmarking of All Submitted Hashes, http://bench.cr.yp.to/ebash.html

External Benchmarking Extension (XBX), http://xbx.das-labor.org/trac

Announcing Approval of Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, and Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard:

https://www.federalregister.gov/documents/2015/08/05/2015-19181/announcing-approval-of-federal-information-processing-standard-fips-202-sha-3-standard

Downloads

Published

2024-04-19

Issue

Section

Cryptography and Cybersecurity