Secure Hash Function Constructing for Future Communication Systems and Networks

31Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The application of Web technologies and forms of electronic document circulation in the process of information exchange between users though simplifies this process. However, generates a number of new threats for the confidentiality, integrity, and availability of information and the appearance of previously unknown vulnerabilities. One of the most common methods of protection is using the digital certificates that ensure the confidential exchange of data between a client and a server by encrypting and authenticating a digital certificate. A digital certificate is a public key, certified by the EDS of the certification center. Nevertheless, a digital certificate is not just a public key with information, but a so-called signature of a server or Web resource that is implemented using the hash functions. Information technologies development and the emergence of new attack types lead to increasing the amount of disadvantages of existing hash functions. Thus, in the paper a new hashing function was proposed, which was based on the SHA-2 hash function. Improvements involved a number of changes: increased the size of words and an increase in the message digest; at the preprocessing stage, the incoming message is supplemented by a pseudorandom sequence; the numbers of nonlinear functions are increased. The proposed changes allow to reduce the number of rounds in the compression function, which will guarantee at least similar stability indicators with simultaneous increase in data processing speed.

Cite

CITATION STYLE

APA

Gnatyuk, S., Kinzeryavyy, V., Kyrychenko, K., Yubuzova, K., Aleksander, M., & Odarchenko, R. (2020). Secure Hash Function Constructing for Future Communication Systems and Networks. In Advances in Intelligent Systems and Computing (Vol. 902, pp. 561–569). Springer Verlag. https://doi.org/10.1007/978-3-030-12082-5_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free