Preview

Informatics

Advanced search

Hashing technique based on SHA-3 using chaotic maps1

https://doi.org/10.37661/1816-0301-2020-17-1-109-118

Abstract

New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security. Introduced algorithm was tested for        resistance against collisions, statistical analysis of output sequences was performed, hashing performance was evaluated. The testing showed a low collision probability. The testing corresponds the standards of National Institute of Standards and Technology and showed that output sequences are close to random. Performance testing showed 60 % enhancement in comparison with plain SHA-3.

About the Authors

A. V. Sidorenko
Belarusian State University
Russian Federation
Alevtina V. Sidorenko, Dr. Sci. (Eng.), Professor of              Department of Physics and Aerospace Technology, Faculty of Radiophisics and Computer Technology


M. S. Shishko
Belarusian State University
Maksim S. Shishko, Postgraduate Student of                  Department of Physics and Aerospace Technology, Faculty of Radiophisics and Computer Technology


References

1. Bayindir L. A review of swarm robotics tasks. Neurocomputing, 2016, vol. 172, pp. 292–321.

2. Navarro I., Matia F. An introduction to swarm robotics. ISRN Robotics, 2013, vol. 2013, pp. 1–10.

3. Higgins F., Tomlinson A., Martin K. M. Survey on security challenges for swarm robotics. Fifth International Conference on Autonomic and Autonomous Systems, 20–25 April 2009, Valencia, Spain. Valencia, 2009, pp. 307–312.

4. Priyadarshini I. Cyber Security Risks in Robotics, 2017. Available at: https://www.researchgate.net/publication/319354229_Cyber_security_risks_in_Robotics (accessed 21.07.2019).

5. Shah R. Security Landscape for Robotics, 2019. Available at: https://arxiv.org/abs/1904.03033v1 (accessed 21.07.2019).

6. Nakamoto S. Bitcoin: a Peer-to-Peer Electronic Cash System, 2008, Available at: https://bitcoin.org/bitcoin.pdf (accessed 21.07.2019).

7. Lopes V., Alexandre L. A. An Overview of Blockchain Integration with Robotics and Artificial Intelligence, 2018. Available at: https://arxiv.org/abs/1810.00329v1 (accessed 21.07.2019).

8. Ferrer E. C. The Blockchain: a New Framework for Robotic Swarm Systems, 2017. Available at: https://arxiv.org/abs/1608.00695v4 (accessed 21.07.2019).

9. Chi L., Zhu X. Hashing techniques: a survey and taxonomy. ACM Computing Surveys, 2017, vol. 50, no. 1, pр. 1–36. https://doi.org/10.1145/3047307

10. Bertoni G., Daemen J., Peeters M., Assche van G. The Keccak Reference, 2011. Available at: https://keccak.team/files/Keccak-reference-3.0.pdf (accessed 21.07.2019).


Review

For citations:


Sidorenko A.V., Shishko M.S. Hashing technique based on SHA-3 using chaotic maps1. Informatics. 2020;17(1):109-118. (In Russ.) https://doi.org/10.37661/1816-0301-2020-17-1-109-118

Views: 985


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1816-0301 (Print)
ISSN 2617-6963 (Online)