Hash Functions are Based on Three-Dimensional Stochastic Transformations

The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defi...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference s. 202 - 205
Hlavní autori: Chugunkov, Ilya V., Ivanov, Michael A., Kliuchnikova, Bogdana V.
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.01.2019
Predmet:
ISSN:2376-6565
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies.
ISSN:2376-6565
DOI:10.1109/EIConRus.2019.8656708