DEVELOPMENT AND ANALYSIS OF THE NEW HASHING ALGORITHM BASED ON BLOCK CIPHER


Sakan K. Nyssanbayeva S. Kapalova N. Algazy K. Khompysh A. Dyusenbayev D.
2022Technology Center

Eastern-European Journal of Enterprise Technologies
2022#2Issue 9-11660 - 73 pp.

This paper proposes the new hash algorithm HBC- 256 (Hash based on Block Cipher) based on the symmetric block cipher of the CF (Compression Function). The algorithm is based on the wipe-pipe construct, a modified version of the Merkle-Damgard construct. To transform the block cipher CF into a one-way compression function, the Davis-Meyer scheme is used, which, according to the results of research, is recognized as a strong and secure scheme for constructing hash functions based on block ciphers. The symmetric CF block cipher algorithm used consists of three transformations (Stage-1, Stage-2, and Stage-3), which include modulo two addition, circular shift, and substitution box (four-bit S-boxes). The four substitution boxes are selected from the “golden” set of S-boxes, which have ideal cryptographic properties. The HBC-256 scheme is designed to strike an effective balance between computational speed and protection against a preimage attack. The CF algorithm uses an AES-like primitive as an internal transformation. The hash image was tested for randomness using the NIST (National Institute of Standards and Technology) statistical test suite, the results were examined for the presence of an avalanche effect in the CF encryption algorithm and the HBC-256 hash algorithm itself. The resistance of HBC-256 to near collisions has been practically tested. Since the classical block cipher key expansion algorithms slow down the hash function, the proposed algorithm is adapted for hardware and software implementation by applying parallel computing. A hashing algorithm was developed that has a sufficiently large freedom to select the sizes of the input blocks and the output hash digest. This will make it possible to create an almost universal hashing algorithm and use it in any cryptographic protocols and electronic digital signature algorithms © Copyright

block cipher , collision , hash digest , Hash function , hash function security

Text of the article Перейти на текст статьи

Faculty of Information Technology, Al-Farabi Kazakh National University, Al-Farabi ave., 71, Almaty, 050040, Kazakhstan
Information Security Laboratory, Institute of Information and Computational Technologies, Shevchenko str., 28, Almaty, 050010, Kazakhstan

Faculty of Information Technology
Information Security Laboratory

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026