Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ IEEE Accessarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2020 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article
License: CC BY
Data sources: UnpayWall
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2020
Data sources: DOAJ
https://dx.doi.org/10.60692/ds...
Other literature type . 2020
Data sources: Datacite
https://dx.doi.org/10.60692/cy...
Other literature type . 2020
Data sources: Datacite
DBLP
Article
Data sources: DBLP
versions View all 5 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

HMNT: Hash Function Based on New Mersenne Number Transform

HMNT: وظيفة التجزئة بناءً على تحويل رقم Mersenne الجديد
Authors: Ali Maetouq; Salwani Mohd Daud;

HMNT: Hash Function Based on New Mersenne Number Transform

Abstract

Dans le domaine de la sécurité de l'information, les fonctions de hachage sont considérées comme importantes car elles sont utilisées pour assurer l'intégrité et l'authentification des messages.Malgré les diverses méthodes disponibles pour concevoir des fonctions de hachage, les méthodes ont été prouvées inefficaces dans le temps et présentent des failles de sécurité (telles qu'un manque de résistance aux collisions ou une sensibilité aux attaques d'anniversaire).Dans la présente étude, nous proposons un nouveau schéma de fonction de hachage basé sur une nouvelle transformée numérique de Mersenne.La fonction de hachage suggérée appelée Hash Mersenne Number Transform (HMNT) prend une longueur arbitraire car entrée pour générer une valeur de hachage avec des longueurs variables (128, 256 et 512 bits ou plus).Le schéma proposé est évalué en fonction de la sensibilité de la valeur de hachage au message, de la clé secrète et de l'image, de la distribution des hachages, de la confusion et de la diffusion, de la robustesse contre les attaques de collision et d'anniversaire, ainsi que de la flexibilité. Sur la base des résultats de simulation, le schéma suggéré possède une grande sensibilité au message original, à la clé secrète et aux images, ainsi qu'une forte résistance aux collisions. En conclusion, le schéma de hachage proposé est simple et efficace par rapport à l'existant fonctions de hachage, ce qui le rend viable pour une mise en œuvre pratique.

En el campo de la seguridad de la información, las funciones hash se consideran importantes ya que se utilizan para garantizar la integridad y la autenticación de los mensajes. A pesar de los diversos métodos disponibles para diseñar funciones hash, se ha demostrado que los métodos son ineficientes en el tiempo y tienen fallas de seguridad (como la falta de resistencia a las colisiones o la susceptibilidad a los ataques de cumpleaños). En el estudio actual, proponemos un nuevo esquema de función hash basado en una nueva transformada numérica de Mersenne. La función hash sugerida llamada Transformada numérica de Mersenne Hash (HMNT) toma una longitud arbitraria como entrada para generar un valor hash con longitudes variables (128, 256 y 512 bits o más). El esquema propuesto se evalúa en términos de la sensibilidad del valor hash al mensaje, clave secreta e imagen, distribución de hashes, confusión y difusión, robustez contra ataques de colisión y cumpleaños, junto con flexibilidad. Basado en los resultados de la simulación, el esquema sugerido posee una alta sensibilidad al mensaje original, la clave secreta y las imágenes, junto con una fuerte resistencia a la colisión. En conclusión, el esquema hash propuesto es simple y eficiente en comparación con el existente funciones hash, haciéndolas viables para su implementación práctica.

In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication.Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of collision resistance or susceptibility to birthday attacks).In the current study, we propose a novel hash function scheme based on a new Mersenne number transform.The suggested hash function called Hash Mersenne Number Transform (HMNT) takes an arbitrary length as input to generate a hash value with variable lengths (128, 256 and 512-bits or longer).The proposed scheme is evaluated in terms of the sensitivity of the hash value to the message, secret key and image, distribution of hashes, confusion and diffusion, robustness against collision and birthday attacks, alongside flexibility.Based on the simulation outcomes, the suggested scheme possess high sensitivity to the original message, the secret key and images, along with strong collision resistance.In conclusion, the proposed hash scheme is simple and efficient compared with the existing hash functions, making it viable for practical implementation.

في مجال أمن المعلومات، تعتبر وظائف التجزئة مهمة لأنها تستخدم لضمان سلامة الرسالة والمصادقة عليها. على الرغم من الطرق المختلفة المتاحة لتصميم وظائف التجزئة، فقد ثبت أن الطرق غير فعالة من حيث الوقت ولها عيوب أمنية (مثل عدم مقاومة التصادم أو التعرض لهجمات أعياد الميلاد). في الدراسة الحالية، نقترح مخططًا جديدًا لوظيفة التجزئة استنادًا إلى تحويل رقم Mersenne جديد. تأخذ دالة التجزئة المقترحة المسماة تحويل رقم Mersenne (HMNT) طولًا عشوائيًا إدخال لإنشاء قيمة تجزئة بأطوال متغيرة (128 و 256 و 512 بت أو أكثر). يتم تقييم المخطط المقترح من حيث حساسية قيمة التجزئة للرسالة والمفتاح السري والصورة وتوزيع التجزئة والارتباك والانتشار والقوة ضد التصادم وهجمات أعياد الميلاد، إلى جانب المرونة. بناءً على نتائج المحاكاة، يمتلك المخطط المقترح حساسية عالية للرسالة الأصلية والمفتاح السري والصور، إلى جانب مقاومة التصادم القوية. في الختام، يعد مخطط التجزئة المقترح بسيطًا وفعالًا مقارنةً بالمخطط الحالي وظائف التجزئة، مما يجعلها قابلة للتطبيق العملي.

Country
Malaysia
Keywords

Image Encryption, MDC-2, Hash tree, T58.5-58.64 Information technology, message digest authentication, Mersenne number transform, Rolling hash, Cryptanalysis of Block Ciphers and Hash Functions, Characterization and Detection of Android Malware, Theoretical computer science, Compressive Sensing, Double hashing, Artificial Intelligence, Computer security, Collision attack, Hash Functions, Chaos-based Image Encryption Techniques, Hash chain, 005, SHA-2, Collision resistance, Computer science, TK1-9971, Cryptographic hash function, Algorithm, Color Image Encryption, Computer Science, Physical Sciences, Signal Processing, Hash function, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, SWIFFT

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    7
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
7
Top 10%
Average
Top 10%
gold