Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to de...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2022-03-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdf |
_version_ | 1828427428683317248 |
---|---|
author | Artur Hłobaż |
author_facet | Artur Hłobaż |
author_sort | Artur Hłobaż |
collection | DOAJ |
description | The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used. |
first_indexed | 2024-12-10T17:01:38Z |
format | Article |
id | doaj.art-903464fdb8c0492c8a8ebbd9a1477242 |
institution | Directory Open Access Journal |
issn | 2081-8491 2300-1933 |
language | English |
last_indexed | 2024-12-10T17:01:38Z |
publishDate | 2022-03-01 |
publisher | Polish Academy of Sciences |
record_format | Article |
series | International Journal of Electronics and Telecommunications |
spelling | doaj.art-903464fdb8c0492c8a8ebbd9a14772422022-12-22T01:40:33ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332022-03-01vol. 68No 15762https://doi.org/10.24425/ijet.2022.139848Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption MethodArtur Hłobaż0Faculty of Physics and Applied Informatics, University of Lodz, PolandThe paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdfsecure communicationdata encryptiondata securitysecure transmissionsecure data exchange methodsdex methodend-to-end data security |
spellingShingle | Artur Hłobaż Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method International Journal of Electronics and Telecommunications secure communication data encryption data security secure transmission secure data exchange method sdex method end-to-end data security |
title | Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method |
title_full | Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method |
title_fullStr | Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method |
title_full_unstemmed | Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method |
title_short | Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method |
title_sort | analysis of the possibility of using selected hash functions submitted for the sha 3 competition in the sdex encryption method |
topic | secure communication data encryption data security secure transmission secure data exchange method sdex method end-to-end data security |
url | https://journals.pan.pl/Content/122802/PDF/8-3581-H%C5%82oba%C5%BC_sk_new.pdf |
work_keys_str_mv | AT arturhłobaz analysisofthepossibilityofusingselectedhashfunctionssubmittedforthesha3competitioninthesdexencryptionmethod |