Abstract

Blockchain technology provides a novel method for storing information, performing tasks and functions, and establishing trust between participating nodes. Despite the fact that blockchain technology has received significant attention in a variety of application contexts over the last few years, the issue of privacy and security remains the primary focus of blockchain discussions. In Blockchain, the cryptographic hash function is used to secure message blocks and connect blocks in a chain. In summary, each block in the blockchain contains its own block hash as well as a hash of the block before it. This enables them to create a crypto-graphically secure linear chain of blocks. With blockchain technology, there is a new way to store information, carry out tasks and functions, and build trust between the nodes that are taking part. Hash algorithms can be used to make blockchain integration safe, and many of them can solve problems with data integrity and security that arise when using blockchain technology. But they can also have problems with time, lack of resources, and using too much memory. In this study, an algorithm to create a hash based on a chaos key using logistic maps and lightweight cryptography is proposed (hamming bird 2). Hash outputs are tested in terms of time and hardness to guess using cryptanalysis tools. The proposed algorithm has been tested using cryptanalysis site based brute force attacks. The result show that the modified hash cannot identified by site using all cryptanalysis setting that prove the strong of hash generated against attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call