Open Access Open Access  Restricted Access Subscription or Fee Access

Using BTS Encryption as a Hashing Function

M. Ahmed Samy, B. Youssef

Abstract


Building a secure hash function from a symmetric key block cipher is a challenge. This hash function uses an RC6 modified version named BTS KHF (Basheer, Tarek, Salwa keyed hashing function) that produce a variable length hash. The use of hash functions is a crucial in cryptographic security applications for example it secures the integrity of users message on his device. Choosing a robust block cipher algorithm like RC6 is the aim to build a secure hash function. According to the security analysis of RC6 presented by its authors, this algorithm is highly resistant to linear and differential attacks.

This paper is divided into nine sections; the first section the introduction that talks about cryptography and its mathematical techniques, section two refers to the goals and services of the field of cryptography. Section three introduces the concepts of hash functions and its structure. Section four gives a brief introduction to block ciphers and their definition. Section five illustrates the BTS algorithm and how it enhanced the RC6 algorithm, in section six an implementation for BTSKHF (BTS Keyed hashing Function) is illustrated. Section seven the performance and analysis of the newly created algorithm is depicted to show comparisons with other algorithms; finally   the paper ended up with the conclusion in section eight, while section nine contains the references of the articles used in this paper.


Keywords


Basheer Tarek Salwa Keyed Hashing function (BTSKHF), Hash-Based Message Authentication Code using the Message Digest 5 hash function (HMACMD5), Hash-based Message Authentication Code using Race Integrity Primitives Evaluation Message Digest (HMACRIPEMD160

Full Text:

PDF

References


A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. CRC press, 1996.

T. Bartkewitz, ‘Building hash functions from block ciphers, their security and implementation properties’, Ruhr-Univ. Boch., 2009.

N. Ferguson et al., ‘The Skein hash function family’, Submiss. NIST Round 3, vol. 7, no. 7.5, p. 3, 2010.

2015_ODVA_Conference_Woods_Practical-applications-of-Lightweight-Block-Ciphers.pdf.

N. Radha, ‘Novel block ciphers for real time Multimedia applications’, 2014.

B. Youssef, ‘Performance Analysis of Advanced Encryption Standard Algorithms’, masters, Cairo, 2005.

H. Feistel, "Cryptography and Computer Privacy," Scientific American, Vol.228, No.5, pp. 15-23, 1973.

K. Aggarwal, ‘Comparison of RC6, modified RC6 & enhancement of RC6’, in Computer Engineering and Applications.

Abdellaoui A, Khamlichi YI, Chaoui H. A Novel Strong Password Generator for Improving Cloud Authentication. Procedia Comput Sci 2016; 85:293–300. doi: 10.1016/j.procs.2016.05.236.

Rivest R. The MD5 message-digest algorithm 1992.

Jadhao P, Dole L. Survey on Authentication Password Techniques. Int J Soft Comput Eng IJSCE ISSN 2013; 3:2231–2307.

Eastlake D, Jones P. US secure hash algorithm 1 (SHA1). RFC 3174, September; 2001.

Hans Dobbertin, Antoon Bosselaers, Bart Preneel - RIPEMD-160: A Strengthened Version of RIPEMD In Proceedings of FSE, LNCS 1039, pp. 71-82, Springer, 1996.

RFC 2104, section 2, "Definition of HMAC", page 3.

Wouter Penard, Tim van Werkhoven."On the Secure Hash Algorithm family" 2002.

Vincent Rijmen and Elisabeth Oswald. Update on sha-1, 2005.

"The Cryptography Guide: Triple DES". Cryptography World. Available https://www.cryptographyworld.com/des.htm

Stallings W. Cryptography and network security: principles and practice. Seventh edition. Boston: Pearson; 2014.

Comparison of cryptographic hash functions From Wikipedia, the free encyclopedia, Available: https://en.wikipedia.org/wiki/Comparison_of_cryptographic_hash_functions.

“Empirical Evaluation of Hash Functions for Multipoint Measurements”, Christian Henke, Carsten Schmoll, Tanja Zseby, ACM SIGCOMM Computer Communication Review archive Volume 38 Issue 3, July 2008, Pages 39-50.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.