HMNT: hash function based on new Mersenne number transform

In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of colli...

Full description

Saved in:
Bibliographic Details
Main Authors: Maetouq, Ali, Mohd. Daud, Salwani
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2020
Subjects:
Online Access:http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf
http://eprints.utm.my/id/eprint/92212/
http://dx.doi.org/10.1109/ACCESS.2020.2989820
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.92212
record_format eprints
spelling my.utm.922122021-08-30T05:10:16Z http://eprints.utm.my/id/eprint/92212/ HMNT: hash function based on new Mersenne number transform Maetouq, Ali Mohd. Daud, Salwani T58.5-58.64 Information technology In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of collision resistance or susceptibility to birthday attacks). In the current study, we propose a novel hash function scheme based on a new Mersenne number transform. The suggested hash function called Hash Mersenne Number Transform (HMNT) takes an arbitrary length as input to generate a hash value with variable lengths (128, 256 and 512-bits or longer). The proposed scheme is evaluated in terms of the sensitivity of the hash value to the message, secret key and image, distribution of hashes, confusion and diffusion, robustness against collision and birthday attacks, alongside flexibility. Based on the simulation outcomes, the suggested scheme possess high sensitivity to the original message, the secret key and images, along with strong collision resistance. In conclusion, the proposed hash scheme is simple and efficient compared with the existing hash functions, making it viable for practical implementation. Institute of Electrical and Electronics Engineers Inc. 2020-04 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf Maetouq, Ali and Mohd. Daud, Salwani (2020) HMNT: hash function based on new Mersenne number transform. IEEE Access, 8 . pp. 80395-80407. ISSN 2169-3536 http://dx.doi.org/10.1109/ACCESS.2020.2989820 DOI:10.1109/ACCESS.2020.2989820
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T58.5-58.64 Information technology
spellingShingle T58.5-58.64 Information technology
Maetouq, Ali
Mohd. Daud, Salwani
HMNT: hash function based on new Mersenne number transform
description In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of collision resistance or susceptibility to birthday attacks). In the current study, we propose a novel hash function scheme based on a new Mersenne number transform. The suggested hash function called Hash Mersenne Number Transform (HMNT) takes an arbitrary length as input to generate a hash value with variable lengths (128, 256 and 512-bits or longer). The proposed scheme is evaluated in terms of the sensitivity of the hash value to the message, secret key and image, distribution of hashes, confusion and diffusion, robustness against collision and birthday attacks, alongside flexibility. Based on the simulation outcomes, the suggested scheme possess high sensitivity to the original message, the secret key and images, along with strong collision resistance. In conclusion, the proposed hash scheme is simple and efficient compared with the existing hash functions, making it viable for practical implementation.
format Article
author Maetouq, Ali
Mohd. Daud, Salwani
author_facet Maetouq, Ali
Mohd. Daud, Salwani
author_sort Maetouq, Ali
title HMNT: hash function based on new Mersenne number transform
title_short HMNT: hash function based on new Mersenne number transform
title_full HMNT: hash function based on new Mersenne number transform
title_fullStr HMNT: hash function based on new Mersenne number transform
title_full_unstemmed HMNT: hash function based on new Mersenne number transform
title_sort hmnt: hash function based on new mersenne number transform
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2020
url http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf
http://eprints.utm.my/id/eprint/92212/
http://dx.doi.org/10.1109/ACCESS.2020.2989820
_version_ 1709667400098512896