Actions
  • shareshare
  • link
  • cite
  • add
add
auto_awesome_motion View all 2 versions
Publication . Article . 2020

Hashing technique based on SHA-3 using chaotic maps1

A. V. Sidorenko; M. S. Shishko;
Open Access  
Published: 01 Mar 2020 Journal: Informatics, volume 17, pages 109-118 (issn: 1816-0301, eissn: 2617-6963, Copyright policy )
Publisher: United Institute of Informatics Problems of the National Academy of Sciences of Belarus
Abstract
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security. Introduced algorithm was tested for resistance against collisions, statistical analysis of output sequences was performed, hashing performance was evaluated. The testing showed a low collision probability. The testing corresponds the standards of National Institute of Standards and Technology and showed that output sequences are close to random. Performance testing showed 60 % enhancement in comparison with plain SHA-3.
Subjects by Vocabulary

Microsoft Academic Graph classification: Statistical analysis CHAOS (operating system) Chaotic Avalanche effect Computer science Hash function Encryption business.industry business Collision probability Algorithm

Subjects

hashing, encryption, chaos, avalanche effect, statistical cryptanalisys, Electronic computers. Computer science, QA75.5-76.95