Hash Functions are Based on Three-Dimensional Stochastic Transformations

The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference pp. 202 - 205
Main Authors: Chugunkov, Ilya V., Ivanov, Michael A., Kliuchnikova, Bogdana V.
Format: Conference Proceeding
Language:English
Published: IEEE 01.01.2019
Subjects:
ISSN:2376-6565
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies.
AbstractList The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective protection can be done only by using stochastic methods against an active opponent. The effectiveness of stochastic protection methods is defined by the quality of the used pseudo-random number generators and hash functions. The proposed hashing algorithm DOZENHASH is based on the using of 3D stochastic transformations of DOZEN family. The principal feature of the algorithm is that all input and output data blocks as well as intermediate results of calculations are represented as three-dimensional array of bytes with 4 bytes in each dimension. Thus, the resulting transformation has a high degree of parallelism at the level of elementary operations, in other words, it is focused on the implementation using heterogeneous supercomputer technologies.
Author Kliuchnikova, Bogdana V.
Chugunkov, Ilya V.
Ivanov, Michael A.
Author_xml – sequence: 1
  givenname: Ilya V.
  surname: Chugunkov
  fullname: Chugunkov, Ilya V.
  organization: Department of Computer Systems and Technologies, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia
– sequence: 2
  givenname: Michael A.
  surname: Ivanov
  fullname: Ivanov, Michael A.
  organization: Department of Computer Systems and Technologies, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia
– sequence: 3
  givenname: Bogdana V.
  surname: Kliuchnikova
  fullname: Kliuchnikova, Bogdana V.
  organization: Department of Computer Systems and Technologies, National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russia
BookMark eNotj81KxDAUhaMoOI59AhHyAq35aZpkqXXGDgwIWtfDbXpDK9NUms7Ct7forM7iO9-Bc0uuwhiQkAfOMs6ZfdzsyjG8n2ImGLeZKVShmbkgidWGa2E4k9IWl2QlpC7ShaobksT4xRgTgtulsSJVBbGj21Nwcz-GSGFC-gwRWzoGWncTYvrSDxjiQuFIP-bRdRDn3tF6ghD9OA3wZ96Raw_HiMk51-Rzu6nLKt2_ve7Kp33ac63mVEjnm6JxwBEtKCcBmABu0ZucFa3CnCllhPdN69FjywQ6i7mWQjeuBZRrcv-_2yPi4XvqB5h-Dufv8heWdVKU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/EIConRus.2019.8656708
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781728103396
9781728103389
1728103398
172810338X
EISSN 2376-6565
EndPage 205
ExternalDocumentID 8656708
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-23cfb6bca1ee9a5c3aa02a19ef8406d5e405582ffbdfefed02ec9e47327bcdae3
IEDL.DBID RIE
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000469452600048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:51:30 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-23cfb6bca1ee9a5c3aa02a19ef8406d5e405582ffbdfefed02ec9e47327bcdae3
PageCount 4
ParticipantIDs ieee_primary_8656708
PublicationCentury 2000
PublicationDate 2019-Jan.
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – month: 01
  year: 2019
  text: 2019-Jan.
PublicationDecade 2010
PublicationTitle IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference
PublicationTitleAbbrev EIConRus
PublicationYear 2019
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002219728
Score 1.6940681
Snippet The methods are based on injecting unpredictability into means and objects of protection are called stochastic methods of information security. The effective...
SourceID ieee
SourceType Publisher
StartPage 202
SubjectTerms Cryptography
Generators
Hash functions
heterogeneous supercomputer technologies
Information security
NIST
pseudo-random sequence
square and cube architecture
statistical testing
stochastic transformation
Supercomputers
Three-dimensional displays
Title Hash Functions are Based on Three-Dimensional Stochastic Transformations
URI https://ieeexplore.ieee.org/document/8656708
WOSCitedRecordID wos000469452600048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEJ4g8aAXH2B8Zw8eXaHbx7ZXEYIXQhQTbmQfs4FLa0rx9zvbEsTEi7dNN5Mms5P9Zqb9vgF4SAMlrFYhRxMgj2LjOGXhFMuxVJHOtLRS18Mm5GSSzufZtAWPOy4MItY_n-GTX9bf8m1hNr5V1ksp-ZCe2XsgZdJwtXb9FCH8AK10S9IJ-llv-Doo8reN1-QOKCAa219DVGoMGZ387-2n0P0h47HpDmbOoIX5ORzv6Qh2YDxW6yUbEUTVUcRUieyZ4MmyImczOi3kL17Fv1HgYO9VYZbKCzSz2V7eSpZd-BgNZ4Mx345I4CvC_YqL0DidaKMCxEzFJlSqL1SQoaPCLbExUj4Wp8I5bR06tH2BJsNIhkJqYxWGF9DOixwvgWXKkAUq2kkjX4UkMnSSLkRJtrGIrqDjfbL4bFQwFlt3XP_9-AaOvNubZsUttKtyg3dwaL6q1bq8r4_uG21XnWQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6KCurFRyu-3YNH1yabpJtcrS0p1lI0Qm9lH7O0l0Ta1N_vbFJqBS_elixDYGfYb2aS7xtC7mNfcqNkwED7wMJIW4ZZOMZyJGSoEiWMUNWwCTEaxZNJMm6Qhw0XBgCqn8_g0S2rb_mm0CvXKmvHmHwIx-zdjcKQezVba9NR4dyN0IrXNB3fS9q9QbfI31ZOldvHkKitf41RqVCkf_S_9x-T1g8dj443QHNCGpCfksMtJcEmSVO5nNE-glQVR1QugD4hQBla5DRDfwF7djr-tQYHfS8LPZNOoplmW5krWrbIR7-XdVO2HpLA5oj8JeOBtqqjtPQBEhnpQEqPSz8Bi6Vbx0SAGVkUc2uVsWDBeBx0AqEIuFDaSAjOyE5e5HBOaCI1WoDEnTh0dUhHBFbglSjQNuLhBWm6M5l-1joY0_VxXP79-I7sp9nrcDocjF6uyIFzQd26uCY75WIFN2RPf5Xz5eK2cuM3ynygqw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+NW+Russia+Young+Researchers+in+Electrical+and+Electronic+Engineering+Conference&rft.atitle=Hash+Functions+are+Based+on+Three-Dimensional+Stochastic+Transformations&rft.au=Chugunkov%2C+Ilya+V.&rft.au=Ivanov%2C+Michael+A.&rft.au=Kliuchnikova%2C+Bogdana+V.&rft.date=2019-01-01&rft.pub=IEEE&rft.eissn=2376-6565&rft.spage=202&rft.epage=205&rft_id=info:doi/10.1109%2FEIConRus.2019.8656708&rft.externalDocID=8656708