A COLLISION RESISTANCE SECURE HASH ALGORITHM BASED ON A PSEUDO-RANDOM SEQUENCE GENERATOR FOR AUTHENTICATION PROTOCOL

被引:0
|
作者
Yousuf, Ahmed Y. [1 ]
Atia, Tayseer S. [2 ]
机构
[1] Al Mansour Univ Coll, Comp Technol Engn Dept, Baghdad, Iraq
[2] Al Iraqia Univ, Coll Engn, Baghdad, Iraq
来源
JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY | 2022年 / 17卷 / 04期
关键词
Authentication protocol; Best resilient function; Collision Attack; LFSR; Pseudo-random generator; SHA-1; SSL Certificate;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ensuring integrity and authentication for data transfer are essential security goals that will be achieved using cryptography. In this context, the cryptographic hash algorithm was employed in many cryptographic applications and protocols such as digital signature, message authentication code, data source authentication, Secure Socket Layer and Pretty Good Privacy. An efficient security algorithm requires continuous maintenance to fix the vulnerability exploited by an attacker to launch an actualized threat. The prefix collision attack was a successful attack against SHA-1 that took place in January 2020 which exploited the weak point in the algorithm design. As a consequence of this attack, some authentication protocols rejected the certificates that were signed with SHA-1. This paper introduces a randomization principle to control the threats against SHA-1. Randomization is achieved by a pseudo-random sequence generator which consists of Linear Feed Back Register and Best Resilient Function. The pseudo-random sequence operation of the improved algorithm receives an input binary sequence of length 128-bit and produces an arbitrary binary output with good randomness properties. The proposed algorithm works in two modes. The SHA1-Tight in which the proposed operation is utilized in the message expansion stage, and the compression function. While in the SHA1-Light, the SRS is implemented in the message expansion step only. In the test scenarios, SHA1-Tight passes tests with the optimal value and demonstrates the algorithm efficiency for signing a certificate on the authentication protocol. The SHA1-Light passes tests with a result close to the optimal value and ensures message integrity. On the other hand, the obtained results from SHA-1 are disappointing The proposed works imply the effectiveness of utilizing randomness in designing hash algorithms to provide collision resistance.
引用
收藏
页码:2877 / +
页数:15
相关论文
共 11 条
  • [1] A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications
    Brahim, A. Hadj
    Pacha, H. Ali
    Naim, M.
    Pacha, A. Ali
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01)
  • [2] Pseudo-random bit generator based on lag time series
    Garcia-Martinez, M.
    Campos-Canton, E.
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2014, 25 (04):
  • [3] Pseudo-random bit generator based on multi-modal maps
    M. García-Martínez
    E. Campos-Cantón
    Nonlinear Dynamics, 2015, 82 : 2119 - 2131
  • [4] Pseudo-random bit generator based on multi-modal maps
    Garcia-Martinez, M.
    Campos-Canton, E.
    NONLINEAR DYNAMICS, 2015, 82 (04) : 2119 - 2131
  • [5] An Optimized Seed-based Pseudo-random Test Pattern Generator: Theory and Implementation
    Sun, Haijun
    Zeng, Yongjia
    Li, Pu
    Lei, Shaochong
    Shao, Zhibiao
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (04): : 477 - 484
  • [6] A New Pseudo-Random Number Generator Based On The Leap-Ahead LFSR Architecture
    Tan, Zuxiong
    Guo, Weiling
    Gong, Guoliang
    Lu, Huaxiang
    PROCEEDINGS OF 2018 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS, TECHNOLOGIES AND APPLICATIONS (ICTA 2018), 2018, : 57 - 58
  • [7] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function
    Liu Jian-dong
    Wang Ye-quan
    Zhang Xiao
    Shang Kai
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
  • [8] FPGA-based Multi-bit All State Pseudo-Random Sequences Generator
    Duan Yingni
    Zhang Haifeng
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 858 - 861
  • [9] A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
    Unkasevic, Tomislav
    Banjac, Zoran
    Milosavljevic, Milan
    SENSORS, 2019, 19 (23)
  • [10] A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator
    Bhaskar Mondal
    Tarni Mandal
    Multimedia Tools and Applications, 2020, 79 : 17497 - 17520