Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
نویسندگان
چکیده
A blockchain, or in other words a chain of transaction blocks, is distributed database that maintains an ordered blocks reliably connect the information contained them. Copies are usually stored on multiple computers and synchronized accordance with rules building which provides secure change-resistant storage information. To build linked lists hashing used. Hashing special cryptographic primitive one-way, resistance to collisions search for prototypes computation hash value (hash message digest). In this paper comparative analysis performance algorithms can be used modern decentralized blockchain networks conducted. Specifically, different desktop systems, number cycles per byte (Cycles/byte), amount hashed second (MB/s) rate (KHash/s) investigated. The allows us choose most suitable candidates systems type blockchain.
منابع مشابه
Analysis and Design of Cryptographic Hash Functions
The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash functions are reviewed. The information theoretic approach to authentication is de...
متن کاملDynamic Cryptographic Hash Functions
Speirs II, William Robert Ph.D., Purdue University, May, 2007. Dynamic Cryptographic Hash Functions. Major Professor: Samuel S. Wagstaff, Jr. This dissertation introduces a new type of cryptographic hash function, the dynamic cryptographic hash function. Dynamic cryptographic hash functions differ from traditional hash functions because they require a second parameter, the security parameter. T...
متن کاملCryptographic hash functions
Hash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks. This paper sketches the history of the concept, discusses the applications of hash functions, and presents the approaches that have be...
متن کاملProperties of Cryptographic Hash Functions
This paper extends the work of Rogaway and Shrimpton [6], where they formalized seven security properties: notions of preimage resistance (Pre, aPre, ePre), second-preimage resistance (Sec, aSec, eSec) and collision resistance (Coll). They also give all the implications and separations among the properties. In this paper we consider three additional security properties which are important in ap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Network and Information Security
سال: 2021
ISSN: ['2074-9090', '2074-9104']
DOI: https://doi.org/10.5815/ijcnis.2021.02.01