{"title":"Novel Approach for Key-Based Hashing Algorithm","authors":"Kaushal A. Shah, Kunj Joshi, Dwireph Parmar, Dhrumin Patel, Mukti Padhya","doi":"10.1109/TENSYMP55890.2023.10223660","DOIUrl":null,"url":null,"abstract":"The existing key-based hashing algorithms, such as HMAC, NMAC and GMAC are highly dependent on pre-existing hashing algorithms such as MD5 and SHA1 which are self-sufficient and independent from the usage of keys. Hence, as a result, the key-based hashing algorithms inherit many aspects of security from its underlying algorithm and usually enhance it. But this feature also accounts for the loopholes in key-based hashing algorithms. The key-based hashing algorithms also inherit the number of rounds, used to hash the message, from its underlying algorithm as well. A fixed number of rounds also allows attacks on particular rounds in the algorithm to crack it. In this paper, a new, independent hashing algorithm is introduced which does not have a fixed number of rounds and is based on basic mathematical and Boolean concepts of Bitwise Operators. The performance and security analysis have shown in results, that the proposed algorithm is resistant towards known attacks on hashing algorithms and a few other attacks proposed by other researchers. Its performance analysis shows that it works in O(k3/2) time complexity which is efficient than O(k2) Time Complexity used in many widely used Key-Based Hashing Algorithms.","PeriodicalId":314726,"journal":{"name":"2023 IEEE Region 10 Symposium (TENSYMP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Region 10 Symposium (TENSYMP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENSYMP55890.2023.10223660","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The existing key-based hashing algorithms, such as HMAC, NMAC and GMAC are highly dependent on pre-existing hashing algorithms such as MD5 and SHA1 which are self-sufficient and independent from the usage of keys. Hence, as a result, the key-based hashing algorithms inherit many aspects of security from its underlying algorithm and usually enhance it. But this feature also accounts for the loopholes in key-based hashing algorithms. The key-based hashing algorithms also inherit the number of rounds, used to hash the message, from its underlying algorithm as well. A fixed number of rounds also allows attacks on particular rounds in the algorithm to crack it. In this paper, a new, independent hashing algorithm is introduced which does not have a fixed number of rounds and is based on basic mathematical and Boolean concepts of Bitwise Operators. The performance and security analysis have shown in results, that the proposed algorithm is resistant towards known attacks on hashing algorithms and a few other attacks proposed by other researchers. Its performance analysis shows that it works in O(k3/2) time complexity which is efficient than O(k2) Time Complexity used in many widely used Key-Based Hashing Algorithms.