2022
DOI: 10.3390/math10152769
|View full text |Cite
|
Sign up to set email alerts
|

Developing a New Collision-Resistant Hashing Algorithm

Abstract: Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable. This article is aiming at the development of a new hashing algorithm that will be resistant to all cryptographic attacks, including quantum collision attacks that potentially pose a threat to some widely used cryptographic hash functions. This algorithm was called Nik-512. The avalanche e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…However, solutions or countermeasures have already been proposed by researchers for many of these challenges in the form of modifications to blockchain algorithms and data structures. Another important issue is collision resistance of cryptographic hash functions [ 169 ].…”
Section: Secure Data Transmission Methodsmentioning
confidence: 99%
“…However, solutions or countermeasures have already been proposed by researchers for many of these challenges in the form of modifications to blockchain algorithms and data structures. Another important issue is collision resistance of cryptographic hash functions [ 169 ].…”
Section: Secure Data Transmission Methodsmentioning
confidence: 99%
“…As a consequence of this, the creation of novel hashing algorithms that provide enough cryptographic resilience in the face of contemporary assaults made feasible by supercomputers and quantum computers is an imperative need. Utilizing effective cryptographic hash algorithms makes it feasible to protect the data even in the face of ongoing increases in computing power that may be made available to potential adversaries [21]. This is because these adversaries are unlikely to be able to get their hands on such capacity.…”
Section: Background Theorymentioning
confidence: 99%
“…The rise of quantum computing is changing how we think about security [1] in cryptography. Hash functions [2], essential for digital security, are especially vulnerable in this new era. This study delves into the risks posed by quantum computing to traditional security methods and looks at Quantum-Resistant Hash Functions (QRHFs) as a crucial aspect of secure cryptographic systems moving forward [3].…”
Section: Introductionmentioning
confidence: 99%