Cryptographic randomness test of the modified hashing function of SHA256 to address length extension attack
College
College of Computer Studies
Document Type
Conference Proceeding
Source Title
ICCBN '20: 2020 8th International Conference on Communications and Broadband Networking
Publication Date
4-2020
Abstract
Length Extension attack is vulnerable to SHA256. It is a type of attack where certain types of hashes are misused as message authentication codes and allowing for inclusion of extra information. In this study, the researchers introduced an improved padding scheme and hashing process for SHA256 to address this problem. To prove that the modified hash function is cryptographically secure, statistical tests using Strict Avalanche Effect, Frequency Test (Monobit), Frequency Test within a Block, and Run Test were performed to evaluate the results of the Message Digest. Test results show that the number of ones and zeros in each element is distributed uniformly random in the final hash value. Additionally, runtime execution is much faster in generating the hash code since it has reduced the number of rounds to 32.
html
Digitial Object Identifier (DOI)
10.1145/3390525.3390540
Recommended Citation
Cortez, D. A., Sison, A. M., & Medina, R. P. (2020). Cryptographic randomness test of the modified hashing function of SHA256 to address length extension attack. ICCBN '20: 2020 8th International Conference on Communications and Broadband Networking https://doi.org/10.1145/3390525.3390540
Keywords
Hashing (Computer science); Cryptography
Upload File
wf_no