Diffusion and statistical analysis of STITCH-256

Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A.
Other Authors: 36682671900
Format: Article
Published: 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-29982
record_format dspace
spelling my.uniten.dspace-299822023-12-29T15:43:51Z Diffusion and statistical analysis of STITCH-256 Jamil N. Mahmod R. Z'aba M.R. Udzir N.I. Zukarnain Z.A. 36682671900 6506085008 24726154700 8662597200 23399234800 Avalanche Cryptography Hash function Statistical analysis STITCH-256 Authentication Avalanches (snowslides) Cryptography Hash functions Statistical methods Cryptographic community Cryptographic hash functions Cryptographic primitives Diffusion properties Message authentication Parallel branches Statistical properties STITCH-256 Diffusion Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random. � 2013 Asian Network for Scientific Information. Final 2023-12-29T07:43:51Z 2023-12-29T07:43:51Z 2013 Article 10.3923/jas.2013.673.682 2-s2.0-84879511855 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84879511855&doi=10.3923%2fjas.2013.673.682&partnerID=40&md5=b528ba1504e68c19b33973f1bfa656b0 https://irepository.uniten.edu.my/handle/123456789/29982 13 5 673 682 All Open Access; Bronze Open Access Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Avalanche
Cryptography
Hash function
Statistical analysis
STITCH-256
Authentication
Avalanches (snowslides)
Cryptography
Hash functions
Statistical methods
Cryptographic community
Cryptographic hash functions
Cryptographic primitives
Diffusion properties
Message authentication
Parallel branches
Statistical properties
STITCH-256
Diffusion
spellingShingle Avalanche
Cryptography
Hash function
Statistical analysis
STITCH-256
Authentication
Avalanches (snowslides)
Cryptography
Hash functions
Statistical methods
Cryptographic community
Cryptographic hash functions
Cryptographic primitives
Diffusion properties
Message authentication
Parallel branches
Statistical properties
STITCH-256
Diffusion
Jamil N.
Mahmod R.
Z'aba M.R.
Udzir N.I.
Zukarnain Z.A.
Diffusion and statistical analysis of STITCH-256
description Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random. � 2013 Asian Network for Scientific Information.
author2 36682671900
author_facet 36682671900
Jamil N.
Mahmod R.
Z'aba M.R.
Udzir N.I.
Zukarnain Z.A.
format Article
author Jamil N.
Mahmod R.
Z'aba M.R.
Udzir N.I.
Zukarnain Z.A.
author_sort Jamil N.
title Diffusion and statistical analysis of STITCH-256
title_short Diffusion and statistical analysis of STITCH-256
title_full Diffusion and statistical analysis of STITCH-256
title_fullStr Diffusion and statistical analysis of STITCH-256
title_full_unstemmed Diffusion and statistical analysis of STITCH-256
title_sort diffusion and statistical analysis of stitch-256
publishDate 2023
_version_ 1806427660604145664
score 13.214268