Analysis of hashing algorithms for environmental control systems

N.L. Korepanova, D.A. Sitnikov

Sevastopol State University, RF Sevastopol, Universitetskaya St., 33

E-mail: nat270702@gmail.com

DOI: 10.33075/2220-5861-2020-1-125-134

UDC 004.056.55

Abstract:

     In this paper, hashing algorithms are investigated to ensure the security of transmitted and stored information in the automated information systems (AIS) of environmental monitoring. As a consequence of the fact that the hashing task involves the transformation of the original information into a hash code using a hash function, there is a problem of analyzing the performance of hashing functions for different algorithms. This paper describes the mathematical model of hashing and features of algorithms MD6, SHA-2 and GOST R 34.11-2012. Criteria for performance assessing are time required for performing addition operations, time required for multiplication operations and total time required for performing algorithms. Each algorithm was tested on the same data array consisting of the same input sets (messages) of different lengths, for which a hash value was calculated. Based on the results of experimental studies in which the number of characters in the tested messages changed, diagrams of the dependence of each criterion on the length of the input message were constructed

     As can be seen from the tabular data and graphs, the least time spent on the performance of all algorithms is achieved by the SHA-2 algorithm. This is because the algorithm is much easier to implement, and most calculations are performed by bitwise operations, which are much faster than operations such as addition and multiplication. The algorithm GOST R 34.11-2012 runs longer than MD6, due to more complex structure and the number of multiplication operations.

Keywords: information security; data protection; hashing algorithms; hash function.

To quote, follow the DOI link and use the Actions-Cite option or copy:

[IEEE] N. L. Korepanova and D. A. Sitnikov, “Analysis of hashing algorithms for environmental control systems,” Monitoring systems of environment, no. 1, pp. 125–134, Mar. 2020.

Full text in PDF(RUS)

LIST OF REFERENCES

  1. Korepanova N.L., Lebedeva M.A., Pavlenko L.O. The study of cryptography algorithm in environmental control systems // Environmental Control Systems. 2017. Issue. 8 (28). P. 55–64.
  2. Halimov G.Z. Universal hashing according to a curve of the third kind // Scientific statements of BelSU. Ser. History. Political. Science. Economy. Computer science. 2011. No 1 (96). Vol. 17/1. P. 137–145.
  3. Halimov OG, Bukhantsov AD, Khalimov GZ Construction of Hurwitz curves for universal hashing // Scientific reports of BelSU. Ser. History. Political. Science. Economy. Computer science. 2014. No. 1 (172). Vol. 29/1. P. 153–160.

Loading