Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
No image available for this title
Bookmark Share

Text

Hortex: fungsi hash chaotic sponge

Bety Hayat Susanti - Personal Name; Santi Indarjani - Personal Name; Andriani Adi Lestari - Personal Name; Ikhwanul Hakim Masri - Personal Name;

Abstrak:
Fungsi hash adalah salah satu kriptografi primitif yang masih digunakan secara luas hingga saat ini, terutama karena perannya yang penting dalam menjamin integritas suatu data digital. Di dunia digital, berbagai fungsi hash telah distandarisasi untuk mengatasi masalah integritas data, seperti SHA-1, SHA-2, dan SHA-3. Namun, telah ditemukannya kerentanan pada beberapa standar fungsi hash melalui kriptanalisis, sehingga dirasa perlu untuk melakukan pengembangan desain alternatif dari fungsi hash. Metode yang digunakan dalam melakukan pengembangan desain alternatif fungsi hash ialah dengan menggunakan Design Science Research Methodology. Pengembangan algoritma hash usulan dimulai dengan melakukan studi literatur terhadap desain fungsi hash yang berbasis fungsi sponge dan chaos. Fungsi chaos dan fungsi Addition Rotation XOR (ARX) digunakan dalam perancangan fungsi transformasi pada fungsi sponge dalam pengembangan algoritma hash usulan yang kemudian disebut Hortex. Hortex adalah fungsi hash alternatif berbasis chaotic sponge yang diusulkan yang menghasilkan panjang keluaran sebesar 128-bit. Algoritma Hortex diuji dengan menggunakan Cryptographic Randomness Testing (CRT) untuk mengevaluasi sifat keacakan yang dimiliki dan diserang menggunakan serangan kolisi Yuval dan bruteforce secara teoritis untuk mengevaluasi keamannya. Pengujian yang dilakukan pada algoritma Hortex menunjukkan hasil bahwa Hortex lulus uji CRT dengan demikian Hortex memiliki sifat keacakan yang baik. Hasil serangan pada Hortex menunjukkan bahwa Hortex tahan terhadap serangan kolisi Yuval dan memiliki kompleksitas 2^128 untuk preimage dan second-preimage resistance dan 2^64 untuk collision resistance.

Abstract:
The hash function is one of the primitive cryptography techniques that is still widely used today, mainly because of its important role in ensuring the integrity of digital data. In the digital world, various hash functions have been standardized to address data integrity issues, such as SHA-1, SHA-2, and SHA-3. However, vulnerabilities have been discovered in some hash function standards through cryptanalysis, making it necessary to develop alternative hash function designs. The method used in developing alternative hash function designs is to use the Design Science Research Methodology. The development of the proposed hash algorithm begins with conducting a literature study on the design of hash functions based on sponge and chaos functions. The chaos function and the Addition Rotation XOR (ARX) function are used in designing the transformation function of the sponge function in the development of a proposed hash algorithm which was later named Hortex. Hortex is a proposed alternative hash function based on chaotic sponge that generates a 128-bit output length. The Hortex algorithm was tested using Cryptographic Randomness Testing (CRT) to evaluate its randomness properties and attacked using Yuval's collision attack and bruteforce attacks theoretically to evaluate its security. Tests carried out on the Hortex algorithm show the result that Hortex passes the CRT test thus Hortex has good randomness properties. The results of the attack on Hortex show that Hortex is resistant to Yuval's collision attack and has a complexity of 2^128 for preimage and seconds-preimage resistance and 2^64 for collision resistance.


Availability
#
Rekayasa Kriptografi 2023 IKH h
TA20230101830
Available - Read on Location
#
Rekayasa Kriptografi 2023 IKH h
TA20230101831
Available - Read on Location
Detail Information
Series Title
--
Call Number
2023 IKH h
Publisher
Bogor : Politeknik Siber dan Sandi Negara., 2023
Collation
xv, 54halaman
Language
Indonesia
ISBN/ISSN
--
Classification
Rekayasa Sistem Kriptografi
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
fungsi hash
serangan kolisi
chaotic sponge
cryptographic randomness testing
fungsi chaos
konstruksi sponge
Specific Detail Info
--
Statement of Responsibility
Ikhwanul Hakim Masri
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?