<span>Nowadays, cryptography especially hash functions require to move from classical paradigms to an original concept able to handle security issues and new hardware architecture challenges as in distributed systems. In fact, most of current hash functions apply the same design pattern that was proved vulnerable against security threats; hence the impact of a potential weakness can be costly. Thus, the solution begins with a deep analysis of divers attack strategies; this way can lead to finding a new approach that enables new innovative and reliable candidates as alternative hash functions. So to achieve this goal, in this article we introduce a new construction design that consists of a non-iterative behavior by combining a parallel block processing and a sequential xor addition process, in order to provide a secure design without changing the expected goal of a hash function, at the same time avoid the use of vulnerable structures.</span>
<span>The non-iterative hash function design is a domain extension that uses a novel concept to fill a gap in existing cryptographic designs. This design avoids the structural issues that plagued prior paradigms, particularly those applying the Merkel-Damgârd design, by presenting a novel approach. Non-iterative hash function design, on the other hand, is an abstract idea that necessitates the specification of the internal transformation in order to test and experiment it. To achieve this goal, this article describes the algorithm that implements the internal transformation based on the main characteristics of the new model. The avalanche effect's results are provided in the experiment section, as well as a preliminary validation stage of the national institute of standards and technology (NIST's) cryptographic algorithm validation program (CAVP), which employs a set of test vectors to verify algorithm accuracy and implementation errors.</span>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.