Hash Functions are Based on Three-Dimensional Stochastic Transformations
The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defi...
Uloženo v:
| Vydáno v: | IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference s. 202 - 205 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.01.2019
|
| Témata: | |
| ISSN: | 2376-6565 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies. |
|---|---|
| AbstractList | The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies. |
| Author | Kliuchnikova, Bogdana V. Chugunkov, Ilya V. Ivanov, Michael A. |
| Author_xml | – sequence: 1 givenname: Ilya V. surname: Chugunkov fullname: Chugunkov, Ilya V. organization: Department of Computer Systems and Technologies, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia – sequence: 2 givenname: Michael A. surname: Ivanov fullname: Ivanov, Michael A. organization: Department of Computer Systems and Technologies, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia – sequence: 3 givenname: Bogdana V. surname: Kliuchnikova fullname: Kliuchnikova, Bogdana V. organization: Department of Computer Systems and Technologies, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia |
| BookMark | eNotj81KxDAUhaMoOI59AhHyAq35aZpkqXXGDgwIWtfDbXpDK9NUms7Ct7forM7iO9-Bc0uuwhiQkAfOMs6ZfdzsyjG8n2ImGLeZKVShmbkgidWGa2E4k9IWl2QlpC7ShaobksT4xRgTgtulsSJVBbGj21Nwcz-GSGFC-gwRWzoGWncTYvrSDxjiQuFIP-bRdRDn3tF6ghD9OA3wZ96Raw_HiMk51-Rzu6nLKt2_ve7Kp33ac63mVEjnm6JxwBEtKCcBmABu0ZucFa3CnCllhPdN69FjywQ6i7mWQjeuBZRrcv-_2yPi4XvqB5h-Dufv8heWdVKU |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/EIConRus.2019.8656708 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781728103396 9781728103389 1728103398 172810338X |
| EISSN | 2376-6565 |
| EndPage | 205 |
| ExternalDocumentID | 8656708 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-23cfb6bca1ee9a5c3aa02a19ef8406d5e405582ffbdfefed02ec9e47327bcdae3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000469452600048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:51:30 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-23cfb6bca1ee9a5c3aa02a19ef8406d5e405582ffbdfefed02ec9e47327bcdae3 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_8656708 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-Jan. |
| PublicationDateYYYYMMDD | 2019-01-01 |
| PublicationDate_xml | – month: 01 year: 2019 text: 2019-Jan. |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference |
| PublicationTitleAbbrev | EIConRus |
| PublicationYear | 2019 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0002219728 |
| Score | 1.6944368 |
| Snippet | The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 202 |
| SubjectTerms | Cryptography Generators Hash functions heterogeneous supercomputer technologies Information security NIST pseudo-random sequence square and cube architecture statistical testing stochastic transformation Supercomputers Three-dimensional displays |
| Title | Hash Functions are Based on Three-Dimensional Stochastic Transformations |
| URI | https://ieeexplore.ieee.org/document/8656708 |
| WOSCitedRecordID | wos000469452600048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED2VigEWPlrEtzwwYlrbSZyslFZlqSooUrfKH2e1S4LSlN-PnVSlSCxskSXb0vmsd7nkvQfwYIOLiIoZTbWNaSTQ-CulJQ1SJEwbqZVQtdmEnEzS-TybtuBxx4VBxPrnM3wKj_W3fFuYTWiV9VJffMjA7D2QMmm4Wrt-CufBQCvdknRYP-sNXwdF_rYJmtzMJ0Qz95eJSo0ho5P_7X4K3R8yHpnuYOYMWpifw_GejmAHxmO1XpKRh6g6i4gqkTx7eLKkyMnMnxbSl6Di3yhwkPeqMEsVBJrJbK9u9TO78DEazgZjurVIoCuP-xXlwjidaKMYYqZiI5Tqc8UydP7FLbEx-nosTrlz2jp0aPscTYaRFFxqYxWKC2jnRY6XQJgwTDgVc8cxShOmo8gyvwz3FYsH_ewKOiEmi89GBWOxDcf138M3cBTC3jQrbqFdlRu8g0PzVa3W5X19dN9i75yI |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFL0MFdQXPzbx2zz4aF2TtGv76tzocI6hFfY28nHD9tLK1vn7TdoxJ_jiWwikgdyUc3OTcw7AvXYuIiKkXix16AUclf2lZOQ5KRIqVSQFF5XZRDQaxZNJMm7Aw4YLg4jV4zN8dM3qLl8XauVKZe3YJh-RY_buhkHA_JqttamoMOYstOI1TYf6Sbs36Bb528qpclO7JerRv2xUKhTpH_1v_mNo_dDxyHgDNCfQwPwUDreUBJuQpmI5I30LUtU-ImKB5MkClCZFTjIbL_SenY5_rcFB3stCzYSTaCbZVuZqR7bgo9_Luqm3Nknw5hb5S49xZWRHKkERExEqLoTPBE3Q2KNbR4doM7IwZsZIbdCg9hmqBIOIs0gqLZCfwU5e5HgOhHJFuREhMwyDuENlEGhqP8NszmJhP7mApluT6WetgzFdL8fl3913sJ9mr8PpcDB6uYIDF4K6dHENO-VihTewp77K-XJxW4XxG7Tyn88 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+NW+Russia+Young+Researchers+in+Electrical+and+Electronic+Engineering+Conference&rft.atitle=Hash+Functions+are+Based+on+Three-Dimensional+Stochastic+Transformations&rft.au=Chugunkov%2C+Ilya+V.&rft.au=Ivanov%2C+Michael+A.&rft.au=Kliuchnikova%2C+Bogdana+V.&rft.date=2019-01-01&rft.pub=IEEE&rft.eissn=2376-6565&rft.spage=202&rft.epage=205&rft_id=info:doi/10.1109%2FEIConRus.2019.8656708&rft.externalDocID=8656708 |