Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method

The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to de...

Full description

Bibliographic Details
Main Author: Artur Hłobaż
Format: Article
Language:English
Published: Polish Academy of Sciences 2022-03-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdf
_version_ 1828427428683317248
author Artur Hłobaż
author_facet Artur Hłobaż
author_sort Artur Hłobaż
collection DOAJ
description The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
first_indexed 2024-12-10T17:01:38Z
format Article
id doaj.art-903464fdb8c0492c8a8ebbd9a1477242
institution Directory Open Access Journal
issn 2081-8491
2300-1933
language English
last_indexed 2024-12-10T17:01:38Z
publishDate 2022-03-01
publisher Polish Academy of Sciences
record_format Article
series International Journal of Electronics and Telecommunications
spelling doaj.art-903464fdb8c0492c8a8ebbd9a14772422022-12-22T01:40:33ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332022-03-01vol. 68No 15762https://doi.org/10.24425/ijet.2022.139848Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption MethodArtur Hłobaż0Faculty of Physics and Applied Informatics, University of Lodz, PolandThe paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdfsecure communicationdata encryptiondata securitysecure transmissionsecure data exchange methodsdex methodend-to-end data security
spellingShingle Artur Hłobaż
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
International Journal of Electronics and Telecommunications
secure communication
data encryption
data security
secure transmission
secure data exchange method
sdex method
end-to-end data security
title Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
title_full Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
title_fullStr Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
title_full_unstemmed Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
title_short Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
title_sort analysis of the possibility of using selected hash functions submitted for the sha 3 competition in the sdex encryption method
topic secure communication
data encryption
data security
secure transmission
secure data exchange method
sdex method
end-to-end data security
url https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdf
work_keys_str_mv AT arturhłobaz analysisofthepossibilityofusingselectedhashfunctionssubmittedforthesha3competitioninthesdexencryptionmethod