2020
DOI: 10.11591/ijai.v9.i2.pp229-235
|View full text |Cite
|
Sign up to set email alerts
|

New concept for cryptographic construction design based on noniterative behavior

Abstract: <span>Nowadays, cryptography especially hash functions require to move from classical paradigms to an original concept able to handle security issues and new hardware architecture challenges as in distributed systems. In fact, most of current hash functions apply the same design pattern that was proved vulnerable against security threats; hence the impact of a potential weakness can be costly. Thus, the solution begins with a deep analysis of divers attack strategies; this way can lead to finding a new a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…NIHF [5] is an abstract concept that requires implementation to the internal transformation, as described in the abstruct. In fact, the construction properties are very important to define the behavior of the whole implemented hash function; however, the way the internal transformation is described also defines the security level and strength of the entire function.…”
Section: Description Of the New Hash Functionmentioning
confidence: 99%
See 2 more Smart Citations
“…NIHF [5] is an abstract concept that requires implementation to the internal transformation, as described in the abstruct. In fact, the construction properties are very important to define the behavior of the whole implemented hash function; however, the way the internal transformation is described also defines the security level and strength of the entire function.…”
Section: Description Of the New Hash Functionmentioning
confidence: 99%
“…Almost cryptographic hash functions take advantage from operational mode to simplify the way how to process a non-fixed input length and generate fixed length output, here we call back some specific Int J Artif Intell ISSN: 2252-8938  New implementation of the abstract design for non-iterative hash functions … (Abouchouar Abdallah) 1215 characteristics of the non-iterative domain extension [5] implemented with the new hash function: i) There is no initialization vector to handle; ii) The internal transformation has a role to extend the input blocks, not to compress them as in the classic paradigm; iii) Each input block is processed separately; iv) This model can provide a pseudo parallel processing based on separate input blocks; v) It applies a sequential a sequential eXclusive OR XOR addition, involving all extended outputs; and vi) This construction design joins a pseudo parallel behavior to an iterative one. The Figure 2 illustrates the design characteristics:…”
Section: Applied Construction Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Inclusively, the equation by adding 1 more secret code is considered the strength of this research. While existing techniques usually try to improve the hash function [ 18,28] , the proposed SXR technique focuses on the password storing. Enhancing security could be done by calculating the ratio that divides the hash value and the number of iterations.…”
Section: Algorithm 1: Brute-force Sxr Verificationmentioning
confidence: 99%
“…m=8) results in a low security system, since attackers can try to extract the plaintext from the ciphertext through frequency analysis if they have a basic knowledge of the statistical patterns in the plaintext. Moreover, attackers can build a codebook for the plaintext-ciphertext pairs that corresponds to a particular key if they have guessed the plaintext that relates to their ciphertext [5,6].…”
Section: Introductionmentioning
confidence: 99%