The study of the speed and statistical security of cryptographic hashing algorithms
DOI:
https://doi.org/10.30837/rt.2019.3.198.06Keywords:
hashing, speed of action performance, cryptographic algorithm, blockchain, cryptocurrencyAbstract
Comparative studies of cryptographic hashing algorithms are being carried out, which are used (or can be applied) in modern decentralized blockchain systems. In particular, hashing speed of action is studied on different desktop systems, the number of clock cycles of the computing system per byte (Cycles / byte), the volume of the hashed message per second (MB / s) and the number of generated hash codes per second (KHash / s) are estimated. Additionally, the speed of action speed of action of individual cryptographic hashing functions on graphical computers is investigated. To evaluate statistical security, we study the initial sequences of cryptographic hash functions when they process excessive input data (which are generated using a conventional counter). For comparative studies of statistical security indicators, the NIST STS (Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications) technique is used, which is recommended by the National Institute of Standards and Technology for the study of random and pseudorandom number generators for cryptographic applications.References
Bernstein hash djb2. Електронний ресурс. Режим доступу: https://riot-os.org/api/group__sys__hashes__djb2.html
The C Programming Language by Brian W. Kernighan (1978-02-22) Paperback, Prentice Hall, 178 p.
Hash Functions. Created January 04, 2017, Updated May 03, 2019. Електронний ресурс. Режим доступу: https://csrc.nist.gov/projects/hash-functions/sha-3-project
Classification of the SHA-3 Candidates. By Ewan Fleischmann, Christian Forler, and Michael Gorski. Version 0.90, April 19, 2009. Електронний ресурс. Режим доступу: https://eprint.iacr.org/2008/511.pdf
Ed2k-hash. 7 May 2005. Електронний ресурс. Режим доступу: https://wiki.anidb.info/w/Ed2k-hash
ed2k-tools. Tools for eDonkey2000 and Overnet. Електронний ресурс. Режим доступу:http://ed2k-tools.sourceforge.net/index.shtml
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. By Xiaoyun Wang , Dengguo Feng, Xuejia Lai3, Hongbo Yu. August 17, 2004. Електронний ресурс. Режим доступу: http://eprint.iacr.org/2004/199.pdf
The hash function RIPEMD-160. Електронний ресурс. Режим доступу:
http://homes.esat.kuleuven.be/~bosselae/ripemd160.html
Secure Hash Standard. Federal Information. Processing Standards Publication 180-2. 2002 August 1. (FIPS PUB 180-2) Електронний ресурс. Режим доступу: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
Keccak hashing algorithm (SHA-3) – Keccak Coins and miner for Keccak. Електронний ресурс. Режим доступу: https://coinguides.org/keccak-algorithm-miner-coins/
NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition. Created October 02, 2012, Updated December 11, 2018. Електронний ресурс. Режим доступу: https://www.nist.gov/news-events/news/2012/10/nist-selects-winner-secure-hash-algorithm-sha-3-competition
ГОСТ Р 34.11-2012. Информационная технология. Криптографическая защита информации. Функция хэширования. Дата введения 2013-01-01. Електронний ресурс. Режим доступу: http://docs.cntd.ru/document/gost-r-34-11-2012
A New Standard of Ukraine: The Kupyna Hash Function. Roman Oliynykov1, Ivan Gorbenko, Oleksandr Kazymyrov,Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov. Електронний ресурс. Режим доступу: https://eprint.iacr.org/2015/885.pdf
Argon2. By Dmitry Khovratovich. 30 March 2015. Електронний ресурс. Режим доступу: https://www.cryptolux.org/index.php/Argon2
Алгоритм X13 для майнинга на графических процесорах / Александр Марков. 28 мая 2018. Електронний ресурс. Режим доступу: https://miningbitcoinguide.com/mining/sposoby/x13
Colin Percival. Stronger key derivation via sequential memory-hard functions. 2009. Електронний ресурс. Режим доступу: https://en.bitcoinwiki.org/wiki/Scrypt http://www.tarsnap.com/scrypt/scrypt.pdf
Hashcat. Advanced Password Recovery. Електронний ресурс. Режим доступу: http://hashcat.net/hashcat/
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. – Електронний ресурс. Режим доступу: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf
NIST Cryptographic Toolkit. Електронний ресурс. Режим доступу: https://csrc.nist.gov/projects/random-bit-generation/documentation-and-software
Кузнецов А.А., Мордвинов Р.И., Колованова Е.П., Самойлова А.В. Методика статистического тестирования криптографических алгоритмов // Спеціальні телекомунікаційні системи та захист інформації. Київ, 2014. №1(25). С.54-61
Кузнецов О.О., Луценко М.С., Андрушкевич А.В., Мелкозерова О.М., Новикова Д.В., Лобан А.В. Статистичні дослідження сучасних потокових шифрів // Прикладная радиоэлектроника. Харьков : ХНУРЭ, 2016. Т. 15. №3. С. 167 – 178.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).