HMNT: hash function based on new Mersenne number transform
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of colli...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf http://eprints.utm.my/id/eprint/92212/ http://dx.doi.org/10.1109/ACCESS.2020.2989820 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.92212 |
---|---|
record_format |
eprints |
spelling |
my.utm.922122021-08-30T05:10:16Z http://eprints.utm.my/id/eprint/92212/ HMNT: hash function based on new Mersenne number transform Maetouq, Ali Mohd. Daud, Salwani T58.5-58.64 Information technology In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of collision resistance or susceptibility to birthday attacks). In the current study, we propose a novel hash function scheme based on a new Mersenne number transform. The suggested hash function called Hash Mersenne Number Transform (HMNT) takes an arbitrary length as input to generate a hash value with variable lengths (128, 256 and 512-bits or longer). The proposed scheme is evaluated in terms of the sensitivity of the hash value to the message, secret key and image, distribution of hashes, confusion and diffusion, robustness against collision and birthday attacks, alongside flexibility. Based on the simulation outcomes, the suggested scheme possess high sensitivity to the original message, the secret key and images, along with strong collision resistance. In conclusion, the proposed hash scheme is simple and efficient compared with the existing hash functions, making it viable for practical implementation. Institute of Electrical and Electronics Engineers Inc. 2020-04 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf Maetouq, Ali and Mohd. Daud, Salwani (2020) HMNT: hash function based on new Mersenne number transform. IEEE Access, 8 . pp. 80395-80407. ISSN 2169-3536 http://dx.doi.org/10.1109/ACCESS.2020.2989820 DOI:10.1109/ACCESS.2020.2989820 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
T58.5-58.64 Information technology |
spellingShingle |
T58.5-58.64 Information technology Maetouq, Ali Mohd. Daud, Salwani HMNT: hash function based on new Mersenne number transform |
description |
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of collision resistance or susceptibility to birthday attacks). In the current study, we propose a novel hash function scheme based on a new Mersenne number transform. The suggested hash function called Hash Mersenne Number Transform (HMNT) takes an arbitrary length as input to generate a hash value with variable lengths (128, 256 and 512-bits or longer). The proposed scheme is evaluated in terms of the sensitivity of the hash value to the message, secret key and image, distribution of hashes, confusion and diffusion, robustness against collision and birthday attacks, alongside flexibility. Based on the simulation outcomes, the suggested scheme possess high sensitivity to the original message, the secret key and images, along with strong collision resistance. In conclusion, the proposed hash scheme is simple and efficient compared with the existing hash functions, making it viable for practical implementation. |
format |
Article |
author |
Maetouq, Ali Mohd. Daud, Salwani |
author_facet |
Maetouq, Ali Mohd. Daud, Salwani |
author_sort |
Maetouq, Ali |
title |
HMNT: hash function based on new Mersenne number transform |
title_short |
HMNT: hash function based on new Mersenne number transform |
title_full |
HMNT: hash function based on new Mersenne number transform |
title_fullStr |
HMNT: hash function based on new Mersenne number transform |
title_full_unstemmed |
HMNT: hash function based on new Mersenne number transform |
title_sort |
hmnt: hash function based on new mersenne number transform |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2020 |
url |
http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf http://eprints.utm.my/id/eprint/92212/ http://dx.doi.org/10.1109/ACCESS.2020.2989820 |
_version_ |
1709667400098512896 |
score |
13.209306 |