The development and analysis of TWISH: A lightweight-block-cipher-TWINE-based hash function

Deden Irfan Afryansyah, Magfirawaty, Kalamullah Ramli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security is one of the most important aspects of the Internet of Things (IoT) due to the increasing trend of attacks in an IoT environment. Cryptographic techniques can be used to improve the security aspects of IoT implementation. Due to the limitations of computing resources in most devices connected to the IoT, reliable and efficient hash functions are required. In this paper, TWISH, a new hash design that can be efficiently implemented without compromising the security, is proposed. TWISH is based on the lightweight block cipher TWINE using the Davies-Meyer (DM) scheme. We analyze the security and randomness of the resulting output using the Cryptographic Randomness Test package. These tests include the Strict Avalanche Criterion (SAC), Collision, Coverage, and Linear Span test. The results show that TWISH can pass the applied tests. The tests also indirectly demonstrate that TWISH is quite resistant to near-collision, preimage, and differential/linear attacks.

Original languageEnglish
Title of host publication2018 13th International Conference on Digital Information Management, ICDIM 2018
EditorsEzendu Ariwa, Pit Pichappan, Pit Pichappan, Wael M El-Medany, Asif Naeem
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages210-215
Number of pages6
ISBN (Electronic)9781538652435
DOIs
Publication statusPublished - 1 Sep 2018
Event13th International Conference on Digital Information Management, ICDIM 2018 - Berlin, Germany
Duration: 24 Sep 201826 Sep 2018

Publication series

Name2018 13th International Conference on Digital Information Management, ICDIM 2018

Conference

Conference13th International Conference on Digital Information Management, ICDIM 2018
CountryGermany
CityBerlin
Period24/09/1826/09/18

Keywords

  • Cryptographic Randomness Test
  • Hash Function
  • IoT
  • TWINE

Fingerprint Dive into the research topics of 'The development and analysis of TWISH: A lightweight-block-cipher-TWINE-based hash function'. Together they form a unique fingerprint.

Cite this