Diffusion and statistical analysis of STITCH-256

N. Jamil, R. Mahmod, M. R. Z'aba, N. I. Udzir, Z. A. Zukarnain

Research output: Contribution to journalArticle

Abstract

Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random.

Original languageEnglish
Pages (from-to)673-682
Number of pages10
JournalJournal of Applied Sciences
Volume13
Issue number5
DOIs
Publication statusPublished - 04 Jul 2013

Fingerprint

avalanche
statistical analysis
test

All Science Journal Classification (ASJC) codes

  • General

Cite this

Jamil, N., Mahmod, R., Z'aba, M. R., Udzir, N. I., & Zukarnain, Z. A. (2013). Diffusion and statistical analysis of STITCH-256. Journal of Applied Sciences, 13(5), 673-682. https://doi.org/10.3923/jas.2013.673.682
Jamil, N. ; Mahmod, R. ; Z'aba, M. R. ; Udzir, N. I. ; Zukarnain, Z. A. / Diffusion and statistical analysis of STITCH-256. In: Journal of Applied Sciences. 2013 ; Vol. 13, No. 5. pp. 673-682.
@article{d826026424434f4989d8bfd239bc7b04,
title = "Diffusion and statistical analysis of STITCH-256",
abstract = "Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random.",
author = "N. Jamil and R. Mahmod and Z'aba, {M. R.} and Udzir, {N. I.} and Zukarnain, {Z. A.}",
year = "2013",
month = "7",
day = "4",
doi = "10.3923/jas.2013.673.682",
language = "English",
volume = "13",
pages = "673--682",
journal = "Journal of Applied Sciences",
issn = "1812-5654",
publisher = "Asian Network for Scientific Information",
number = "5",

}

Jamil, N, Mahmod, R, Z'aba, MR, Udzir, NI & Zukarnain, ZA 2013, 'Diffusion and statistical analysis of STITCH-256', Journal of Applied Sciences, vol. 13, no. 5, pp. 673-682. https://doi.org/10.3923/jas.2013.673.682

Diffusion and statistical analysis of STITCH-256. / Jamil, N.; Mahmod, R.; Z'aba, M. R.; Udzir, N. I.; Zukarnain, Z. A.

In: Journal of Applied Sciences, Vol. 13, No. 5, 04.07.2013, p. 673-682.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Diffusion and statistical analysis of STITCH-256

AU - Jamil, N.

AU - Mahmod, R.

AU - Z'aba, M. R.

AU - Udzir, N. I.

AU - Zukarnain, Z. A.

PY - 2013/7/4

Y1 - 2013/7/4

N2 - Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random.

AB - Hash function is an important cryptographic primitive used in a wide range of applications, for example, for message authentication and in digital signatures. MD 4/5 and SHA-0/1/2 are examples of widely used hash functions, but except for SHA-2 (SHA-224, 256, 384, 512), they were all broken in 2005 after more than a decade of use. Since, then, the structure and components of cryptographic hash functions have been studied and revisited extensively by the cryptographic community. STITCH-256 was introduced to overcome problems faced by the MD- and SHA-family hash functions. STITCH-256 employs the Balanced Feistel network and its step operation runs in four parallel branches. The algorithm was claimed to produce good diffusion and its outputs were claimed to be random. To evaluate its suitability for such purposes, avalanche and empirical statisti- cal tests are commonly employed to show that there is empirical evidence supporting the claims. In this study, we report on the studies that were conducted on the 1000 sample of 256 bit of output from STITCH-256 algorithm. The studies include the study of diffusion and statistical properties of STITCH-256 using avalanche test and nine statistical tests. The results suggest that the claims were true where STITCH-256 produces good avalanche effect, thus good diffusion property and its outputs appear random.

UR - http://www.scopus.com/inward/record.url?scp=84879511855&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84879511855&partnerID=8YFLogxK

U2 - 10.3923/jas.2013.673.682

DO - 10.3923/jas.2013.673.682

M3 - Article

AN - SCOPUS:84879511855

VL - 13

SP - 673

EP - 682

JO - Journal of Applied Sciences

JF - Journal of Applied Sciences

SN - 1812-5654

IS - 5

ER -