International Journal of Electronics and Telecommunications (Mar 2022)

Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method

  • Artur Hłobaż

DOI
https://doi.org/10.24425/ijet.2022.139848
Journal volume & issue
Vol. vol. 68, no. No 1
pp. 57 – 62

Abstract

Read online

The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.

Keywords