Search Results/Filters    

Filters

Year

Banks



Expert Group







Full-Text


Issue Info: 
  • Year: 

    2018
  • Volume: 

    6
  • Issue: 

    3 (23)
  • Pages: 

    59-64
Measures: 
  • Citations: 

    0
  • Views: 

    605
  • Downloads: 

    0
Abstract: 

Hash functions have a very important role in network and telecommunication security. These functions play an important role in Hashing a message which are widely used in cryptographic applications such as digital signatures, random number generator algorithms, authentication protocols, and so on. Rotational cryptanalysis is a relatively new attack that is part of a generic attack on Hash functions and is effective on algorithms that have an ARX structure. In this paper, for the first time, we apply a rotational cryptanalysis and with the given assumption of the markov chain for the modular additions sequence employed in two algorithms Shabal and CubeHash, which are second-round candidates for the SHA-3 competition that use the ARX property in their structure. With the implementation of rotational cryptanalysis we arrived at the complexity of 2-3393. 58 for the entire 16+3-rounds Shabal algorithm and the complexity of 2-57. 6 for the en-tire 16-round CubeHash algorithm. According to the obtained results, it can be seen that due to the large number of modular additions with the given assumption of markov chain, the Shabal algorithm exhibits greater resistance to rotational cryptanalysis, compared to the CubeHash algorithm and is less likely to succeed.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 605

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2004
  • Volume: 

    9
Measures: 
  • Views: 

    141
  • Downloads: 

    106
Abstract: 

BRANCH PREDICTION IS IMPORTANT IN HIGH-PERFORMANCE MICROPROCESSOR DESIGN. AMONG BRANCH PREDICTION MECHANISMS, DYNAMIC BRANCH PREDICTORS ARE THE BEST BECAUSE THEY CAN DELIVER ACCURATE BRANCH PREDICTION REGARDLESS OF INPUT CHANGES OR THE PROGRAM BEHAVIOR. HOWEVER IN ALL EXISTING DYNAMIC BRANCH PREDICTORS, THE INTERFERENCE EFFECTS DUE TO ALIASING IN THE PREDICTION TABLES ARE THE MOST IMPORTANT CAUSES OF BRANCH MISPREDICTIONS.IN THIS PAPER SOME POPULAR Hash FUNCTIONS USED IN DIFFERENT COMPUTER APPLICATIONS ARE PROPOSED AND THEIR EFFECTS ON DYNAMIC BRANCH PREDICTORS ARE ANALYZED. WE INVESTIGATE Hash INFLUENCE ON BRANCH PREDICTION ACCURACY IN BOTH ANALYTICAL AND EXPERIMENTAL WAYS. OUR EXPERIMENTAL RESULTS SUGGEST THAT Hash CAN BE INCREMENTALLY EFFECTIVE ON BRANCH PREDICTION ACCURACY AND THIS INCREASE IS DEPENDENT ON BRANCH BEHAVIOR.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 141

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 106
Author(s): 

MOHADES M.M. | KAHAEI M.H.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    46
  • Issue: 

    4 (78)
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    1282
  • Downloads: 

    0
Abstract: 

Deterministic measurement matrices have a crucial character in compressive sensing (CS) applications. These matrices can be generated randomly and deterministically. Due to less memory needed for storage, deterministic matrices have been taken into consideration vastly rather than random ones. In this paper, by use of Hash functions (HF), a group of new measurement matrices has been presented. For this purpose, first, a primary matrix of code is generated then by use of Hash matrices a new matrix is produced.Finally by normalizing the new matrix elements, measurement matrix will be generated. Through this construction, a group of measurement matrices with size of p 2 ´ p 3 and coherence coefficient equal to1 p, where p is a prime integer, will be obtained.Simulation results illustrate that for low values of p, proposed matrices slightly outweigh BCH sampling matrices.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1282

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    11
  • Issue: 

    2
  • Pages: 

    335-354
Measures: 
  • Citations: 

    0
  • Views: 

    27
  • Downloads: 

    2
Abstract: 

Background and Objectives: Cryptographic Hash functions are the linchpins of mobile services, blockchains, and many other technologies. Designing cryptographic Hash functions has been approached by research communities from the physics, mathematics, computer science, and electrical engineering fields. The emergence of new Hash functions, new Hash constructions, and new requirements for application-specific Hash functions, such as the ones of mobile services, have encouraged us to make a comparison of different Hash functions and propose a new classification.Methods: Over 100 papers were surveyed and reviewed in detail. The research conducted in this paper has included four sections; article selection, detailed review of selected articles, data collection, and evaluation of results. Data were collected as new Hash function properties, new Hash function constructions, new Hash function categories, and existing Hash function attacks which are used to evaluate the results.Results: This paper surveys seven categories of Hash functions including block cipher-based functions, algebraic-based functions, custom-designed functions, Memory-hard Functions (MHFs), Physical Unclonable Functions (PUFs), quantum Hash functions and optical Hash functions. To the best of our knowledge, the last four mentioned categories have not been sufficiently addressed in most existing surveys. Furthermore, this paper overviews Hash-related adversaries and six Hash construction variants. In addition, we employed the mentioned adversaries as evaluation criteria to illustrate how different categories of Hash functions withstand the mentioned adversaries. Finally, the surveyed Hash function categories were evaluated against mobile service requirements.Conclusion: In addition to new classification, our findings suggest using PUFs with polynomial-time error correction or possibly bitwise equivalents of algebraic structures that belongs to post-quantum cryptography as candidates to assist mobile service interaction requirements.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 27

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4
  • Pages: 

    211-215
Measures: 
  • Citations: 

    0
  • Views: 

    191
  • Downloads: 

    91
Abstract: 

In this paper, we describe an attack on a new double block length Hash function which was proposed as a variant of MDC-2 and MDC-4. The vMDC-2 compression function is based on two calls to a block cipher that compresses a 3n-bit string to a 2n-bit one. This attack is based on the Joux's multicollision attack, where we show that an adversary wins finding collision game by requesting 270 queries for n=128-bit block cipher that is much less than the complexity of birthday attack.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 191

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 91 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    9
  • Issue: 

    1 (33)
  • Pages: 

    91-100
Measures: 
  • Citations: 

    0
  • Views: 

    311
  • Downloads: 

    0
Abstract: 

A cryptographic Hash function maps an arbitrary length input to a fixed length output. These functions are used in many cryptographic applications such as digital signatures. They must be secure against collision, preimage and 2-preimage attacks. Rotational cryptanalysis is an approach to the analysis of ARX ciphers. The Hash functions Shabal and CubeHash, which are two candidates of the second round of the SHA-3 competition, have an ARX structure. They have been analyzed with respect to rotational cryptanalysis by Tabatabaei et al. In this paper we consider their analysis and present some observations. Our observations show that the results of Tabatabaei et al. ’ s cryptanalysis are not accurate. Then we present some new results about rotational cryptanalysis of Shabal and CubeHash. Thereafter we present some new results and show that rotational cryptanalysis is effective on a smaller number of rounds on Shabal and CubeHash Hash functions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 311

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Colbourn Charles J.

Issue Info: 
  • Year: 

    2024
  • Volume: 

    13
  • Issue: 

    3
  • Pages: 

    293-305
Measures: 
  • Citations: 

    0
  • Views: 

    17
  • Downloads: 

    3
Abstract: 

By exploiting symmetries of finite fields, covering perfect Hash families provide a succinct representation for covering arrays of index one. For certain parameters, this connection has led to both the best current asymptotic existence results and the best known efficient construction algorithms for covering arrays. The connection generalizes in a straightforward manner to arrays in which every $t$-way interaction is covered $\lambda > 1$ times, i.e., to covering arrays of index more than one. Using this framework, we focus on easily computed, explicit upper bounds on numbers of rows for various parameters with higher index.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 17

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 3 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

AlSelami Fudhah A.

Issue Info: 
  • Year: 

    2022
  • Volume: 

    14
  • Issue: 

    2
  • Pages: 

    15-25
Measures: 
  • Citations: 

    0
  • Views: 

    84
  • Downloads: 

    63
Abstract: 

In recent times amount of data is increasing rapidly and analysis of data is a must to come up with business decisions, predictions etc. It’ s not just text are numbers which has to be stored properly. Data Types these days varies from images, video, social media data, surveys to blogs etc. When this is the case its mandatory to deal with Bigdata and to safeguard those Bigdata. Technologies available in Bigdata and Bitcoin helps us in achieving this. Bigdata technologies helps in storing the unstructured data effectively and processing of such voluminous data is taken care of. Hashing algorithms are used in Blockchain to keep the data safe. Hashing algorithms like SHA 256 are used to make it more secure. Its almost not possible to break the data available in Blockchain. Let’ s try to secure the data even more using encryption algorithms to make sure that proper data is used for analysis etc.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 84

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 63 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    1
  • Issue: 

    3
  • Pages: 

    27-39
Measures: 
  • Citations: 

    0
  • Views: 

    58
  • Downloads: 

    14
Abstract: 

Recently, there has been a surge in the popularity of cryptocurrencies, which are digital currencies that enable transactions through a decentralized consensus mechanism. In this paper, one of the most effective EquiHash algorithms subcategories, known as BLAKE2, is presented, and then effort has been made to optimize the compression function as one of the main and most challenging blocks of the BLAKE2 algorithm. In addition, by cognitive partitioning the algorithm between the software/hardware parts of the device, efforts have been made to improve the speed and the number of resource usage. For comparison, implementation was carried out with high-level vs HDL design methods for full and semi-parallel structures. All three methods were implemented using Vivado tools exploiting ZC706 evaluation board. The implementation results indicated that the number of resource usage (LUT/FF) and power consumption of the proposed structure is equal to (6575/4726) and 0. 316(W) respectively Which has created a significant reduction compared to other methods. Moreover, the Hash rate and the energy efficiency of the proposed structure are equal to 50 MHash/s and 6. 3 (𝑛𝐽/𝐻𝑎𝑠ℎ) respectively

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 58

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 14 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1382
  • Volume: 

    14
  • Issue: 

    2
  • Pages: 

    75-89
Measures: 
  • Citations: 

    0
  • Views: 

    959
  • Downloads: 

    0
Abstract: 

یکی از توابع اساسی جهت ایجاد امنیت در شبکه های کامپیوتری، احراز هویت بخش های ارتباطی و اعضای شبکه میباشد. چنین احراز هویتی معمولا نیازمند مبادله پیغامهای رمزنگاری بین بخشهای درگیر در پروتکل میباشد، که این خود مستلزم برقراری کلیدهای مشترک بین طرفین ارتباط است. بدیهی است برقراری این کلیدهای مشترک بین طرفین ارتباط نیز، نیازمند توابع توزیع کلید میباشد. در محیط های ساده ( مثل لایههای پایین شبکه و واحدهای بیسیم) که دارای منابع محاسباتی (پردازنده، حافظه و ... ) محدودی میباشند. برقراری فرآیند توزیع کلید نیازمند این میباشد که پروتکلهای مربوطه در استفاده از منابع سیستم کاملا محتاط باشند، این در حالی است که طرحهای قبلی [15] مثل kerberos و X.509 فاقد این ویژگی بودند، به طوریکه به علت استفاده از الگوریتمهای سنتی رمزنگاری مثل DES و RSA دارای محاسبات رمزنگاری سنگین و پیغامهای نسبتاً طولانی بودند. این مقاله پروتکل سبک وزنی ارایه میکند که به علت کمینه بودن (از نظر تعداد پیغام، طول پیغام، تعداد راندها، میزان محاسبات رمز و حافظه مصرفی) برای استفاده در محیطهای ساده مناسب میباشد و در مقایسه با پروتکلهای موجود از وضعیت بسیار بهتری برخوردار میباشد.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 959

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button