Cryptographic randomness test of the modified hashing function of SHA256 to address length extension attack

College

College of Computer Studies

Document Type

Conference Proceeding

Source Title

ICCBN '20: 2020 8th International Conference on Communications and Broadband Networking

Publication Date

4-2020

Abstract

Length Extension attack is vulnerable to SHA256. It is a type of attack where certain types of hashes are misused as message authentication codes and allowing for inclusion of extra information. In this study, the researchers introduced an improved padding scheme and hashing process for SHA256 to address this problem. To prove that the modified hash function is cryptographically secure, statistical tests using Strict Avalanche Effect, Frequency Test (Monobit), Frequency Test within a Block, and Run Test were performed to evaluate the results of the Message Digest. Test results show that the number of ones and zeros in each element is distributed uniformly random in the final hash value. Additionally, runtime execution is much faster in generating the hash code since it has reduced the number of rounds to 32.

html

Digitial Object Identifier (DOI)

10.1145/3390525.3390540

Keywords

Hashing (Computer science); Cryptography

Upload File

wf_no

This document is currently not available here.

Share

COinS