{"title":"基于SHA-512哈希函数的SDEx增强加密方法的统计分析","authors":"A. Hłobaż","doi":"10.1109/ICCCN49398.2020.9209663","DOIUrl":null,"url":null,"abstract":"The paper presents statistical analysis of the enhanced SDEx method based on SHA-512 hash function. Statistical analysis of the method is performed in a similar way as for the method with the SHA-256, described in [9]. To realize it the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. Additionally, compression tests on encrypted files were performed using the WinRAR software. The SDEx method based on SHA-512 hash function is faster and provides similar or higher level of security than AES with 256-bit key. The method can be used to secure end-to-end encryption in data transferring.","PeriodicalId":137835,"journal":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function\",\"authors\":\"A. Hłobaż\",\"doi\":\"10.1109/ICCCN49398.2020.9209663\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents statistical analysis of the enhanced SDEx method based on SHA-512 hash function. Statistical analysis of the method is performed in a similar way as for the method with the SHA-256, described in [9]. To realize it the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. Additionally, compression tests on encrypted files were performed using the WinRAR software. The SDEx method based on SHA-512 hash function is faster and provides similar or higher level of security than AES with 256-bit key. The method can be used to secure end-to-end encryption in data transferring.\",\"PeriodicalId\":137835,\"journal\":{\"name\":\"2020 29th International Conference on Computer Communications and Networks (ICCCN)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 29th International Conference on Computer Communications and Networks (ICCCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN49398.2020.9209663\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN49398.2020.9209663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function
The paper presents statistical analysis of the enhanced SDEx method based on SHA-512 hash function. Statistical analysis of the method is performed in a similar way as for the method with the SHA-256, described in [9]. To realize it the ciphertext files were tested to check if they fulfill the conditions of pseudo-randomness. To test the pseudo-randomness of the encrypted files, a test package shared by NIST was used for this purpose. Additionally, compression tests on encrypted files were performed using the WinRAR software. The SDEx method based on SHA-512 hash function is faster and provides similar or higher level of security than AES with 256-bit key. The method can be used to secure end-to-end encryption in data transferring.