Cryptographic hash functions have recently brought an exceptional research interest. With the increasing number of attacks against the widely used functions as MD5, SHA-1 and RIPEMD, the need to consider new hash functions design and conception strategies becomes crucial. In this paper, we propose a fast and efficient hash function using programmable cellular automata that are very suitable for cryptographic applications due to their chaotic and complex behavior derived from simple rules interaction. The proposed function is evaluated using several statistical tests, while obtained results demonstrate very admissible cryptographic properties such as confusion/diffusion capability and high sensitivity to input changes. Furthermore, the hashing scheme can be easily implemented through software or hardware, so it provides very competitive running performances.
CITATION STYLE
Belfedhal, A. E., & Faraoun, K. M. (2015). Building secure and fast cryptographic hash functions using programmable cellular automata. Journal of Computing and Information Technology, 23(4), 317–328. https://doi.org/10.2498/cit.1002639
Mendeley helps you to discover research relevant for your work.