تعداد نشریات | 11 |
تعداد شمارهها | 210 |
تعداد مقالات | 2,098 |
تعداد مشاهده مقاله | 2,877,978 |
تعداد دریافت فایل اصل مقاله | 2,085,872 |
Brand New Categories of Cryptographic Hash Functions: A Survey | ||
Journal of Electrical and Computer Engineering Innovations (JECEI) | ||
دوره 11، شماره 2، مهر 2023، صفحه 335-354 اصل مقاله (1.05 M) | ||
نوع مقاله: Original Research Paper | ||
شناسه دیجیتال (DOI): 10.22061/jecei.2023.9271.598 | ||
نویسندگان | ||
B. Sefid-Dashti1؛ J. Salimi Sartakhti* 1؛ H. Daghigh2 | ||
1Department of Computer Engineering, University of Kashan, Kashan, Iran. | ||
2Faculty of Mathematical Science, University of Kashan, Kashan, Iran. | ||
تاریخ دریافت: 07 آذر 1401، تاریخ بازنگری: 23 دی 1401، تاریخ پذیرش: 03 فروردین 1402 | ||
چکیده | ||
Background and Objectives: Cryptographic hash functions are the linchpins of mobile services, blockchains, and many other technologies. Designing cryptographic hash functions has been approached by research communities from the physics, mathematics, computer science, and electrical engineering fields. The emergence of new hash functions, new hash constructions, and new requirements for application-specific hash functions, such as the ones of mobile services, have encouraged us to make a comparison of different hash functions and propose a new classification. Methods: Over 100 papers were surveyed and reviewed in detail. The research conducted in this paper has included four sections; article selection, detailed review of selected articles, data collection, and evaluation of results. Data were collected as new hash function properties, new hash function constructions, new hash function categories, and existing hash function attacks which are used to evaluate the results. Results: This paper surveys seven categories of hash functions including block cipher-based functions, algebraic-based functions, custom-designed functions, Memory-hard Functions (MHFs), Physical Unclonable Functions (PUFs), quantum hash functions and optical hash functions. To the best of our knowledge, the last four mentioned categories have not been sufficiently addressed in most existing surveys. Furthermore, this paper overviews hash-related adversaries and six hash construction variants. In addition, we employed the mentioned adversaries as evaluation criteria to illustrate how different categories of hash functions withstand the mentioned adversaries. Finally, the surveyed hash function categories were evaluated against mobile service requirements. Conclusion: In addition to new classification, our findings suggest using PUFs with polynomial-time error correction or possibly bitwise equivalents of algebraic structures that belongs to post-quantum cryptography as candidates to assist mobile service interaction requirements. | ||
کلیدواژهها | ||
Optical Hash Function؛ Memory-hard Function؛ Physical Unclonable Function؛ Quantum Hash Function؛ Application-specific Hash Function | ||
مراجع | ||
[67] W. Stallings, Network security essentials: Applications and standards, 4th ed. Prentice Hall, 2010.
[79] “D-Wave announces first order for 2000Q quantum computer,” ID Quantique, 24-Feb-2017. Last accessed: Jan. 10, 2023. Available at: D-Wave Announces D-Wave 2000Q Quantum Computer and First System Order — D-Wave Government (dwavefederal.com).
[86] “Language-Integrated Quantum Operations: LIQUi|>,” Microsoft Research. Last accessed: Jan. 10, 2023.
[122] M. Ziiatdinov, “Quantum Hashing. Group approach,” Lobachevskii J. Math., 37(2): 222-226, 2016.
| ||
آمار تعداد مشاهده مقاله: 582 تعداد دریافت فایل اصل مقاله: 423 |