publication . Article . 2020

Hashing technique based on SHA-3 using chaotic maps1

A. V. Sidorenko; M. S. Shishko;
Open Access
  • Published: 01 Mar 2020 Journal: Informatics, volume 17, pages 109-118 (issn: 1816-0301, eissn: 2617-6963, Copyright policy)
  • Publisher: United Institute of Informatics Problems of the National Academy of Sciences of Belarus
Abstract
<jats:p>New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security. Introduced algorithm was tested for        resistance against collisions, statistical analysis of output sequences was performed, hashing performance was evaluated. The testing showed a low collision probability. The testing corresponds the standards of National Institute of Standards and Technology and showed that output sequences are close to random. Performance testing showed 60 % enhancement in comparison with plain SHA-3.</jats:p>
Persistent Identifiers
Subjects
free text keywords: hashing, chaos, statistical cryptanalisys, Encryption, business.industry, business, Computer science, Hash function, Avalanche effect, Statistical analysis, Algorithm, Chaotic, Collision probability, SHA-3, lcsh:Electronic computers. Computer science, lcsh:QA75.5-76.95
Any information missing or wrong?Report an Issue