Diffusion and statistical analysis of STITCH-256

被引:0
作者
Jamil, N. [1 ]
Mahmod, R. [2 ]
Z'aba, M.R. [3 ]
Udzir, N.I. [2 ]
Zukarnain, Z.A. [2 ]
机构
[1] College of Information and Technology, Universiti of Tenaga Nasional, Serdang, 43600 Selangor, Jalan IKRAM-UNITEN
[2] Universiti Putra Malaysia, 43600 Seri Kembangan, Selangor
[3] Cryptography Lab., MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur
关键词
Avalanche; Cryptography; Hash function; Statistical analysis; STITCH-256;
D O I
10.3923/jas.2013.673.682
中图分类号
学科分类号
摘要
Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random. © 2013 Asian Network for Scientific Information.
引用
收藏
页码:673 / 682
页数:9
相关论文
共 19 条
[1]  
Biham E., Chen R., Joux A., Carribault P., Lemuet C., Jalby W., Collisions of SHA-0 and Reduced SHA-1, Advances in Cryptology-EUROCRYPT 2005, 3494, pp. 36-57, (2005)
[2]  
Damgard I.B., A Design Principle for Hash Functions, Advances in Cryptology, pp. 416-427, (1990)
[3]  
Secure Hash Standard (SHS), (1993)
[4]  
Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A., STITCH-256: A new dedicated cryptographic hash function, J. Appl. Sci., 15, pp. 1526-1536, (2012)
[5]  
Merkle R.C., One Way Hash Functions and DES, Advances in Cryptology, pp. 428-446, (1989)
[6]  
FIPS 180-1. Secure Hash Standard (SHS), (1995)
[7]  
Rivest R.L., The MD4 message-digest algorithm, (1992)
[8]  
Rivest R.L., The MD5 message-digest algorithm, (1992)
[9]  
Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Et al., A statistical test suite for random and pseudorandom number generators for cryptographic applications, (2001)
[10]  
Soto J., Bassham L., Randomness testing of the advanced encryption standard finalist candidates, pp. 1-14, (2000)