Development of the Hash Function Using Modified Skew Tent Map to Improve Blockchain Technology
DOI:
https://doi.org/10.30526/38.4.4153Keywords:
SHA256, Blockchain, Skew tent chaotic map , NIST randomness tests, Compression functionAbstract
Using SHA256 in the Blockchain system for security purposes, as it is important in linking blocks and preventing tampering efficiently and securely. In order to further confirm the security of SHA256 and protect it and increase its susceptibility to resist threats that it is exposed to in one way or another, its algorithm was developed by utilizing the modified skew tent map (MSTM). The developed SHA256 algorithm (D-SHA256) is distinguished by two essential features: less time and more enhanced security than its predecessor SHA256. This distinction arises from the strongly chaotic behavior and the highly randomness properties of the MSTM. Moreover, the proposed D-SHA256 algorithm consist of 32 rounds while preserving the randomness properties of the compression function by combining 48 hash constants and 48 words with the MSTM to obtain high randomness with less rounds. D-SHA256 guarantees that in the event of small changes that may occur in the input message leading to large changes in the output hash digest, while confirming the preservation of the properties of the cryptographic hash, containing collision resistance and ideal confusion and diffusion. The proposed algorithm was compared with SHA256 and other current hash algorithms, the results showed that D-SHA256 has increased collision resistance, higher output randomness, better cryptographic hashing properties, and lower execution time
References
1. Salagrama S, Bibhu V, Rana A. Blockchain based data integrity security management. Procedia Comput Sci. 2022;215:331–339. https://doi.org/10.1016/j.procs.2022.12.035
2. Salih RK, Kashmar AH. Enhancing blockchain security by developing the SHA256 algorithm. Iraqi J Sci. 2024;65(10):5678–5693. https://doi.org/10.24996/ijs.2024.65.10.30
3. Jasim AH, Kashmar AH. An evaluation of RSA and a modified SHA-3 for a new design of blockchain technology. In: Artificial Intelligence for Smart Healthcare. Cham: Springer; 2023;477–489. https://doi.org/10.1007/978-3-031-23602-0_28
4. Kumar KP, Varma NH, Devisree N, Ali MS. Implementation of associative service recommendation scheme applying SHA256 algorithm through blockchain. J Surv Fish Sci. 2023;10(2S):2741–2747. https://sifisheriessciences.com/journal/index.php/journal/article/view/1325
5. Fotohi R, Aliee FS. Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Comput Netw. 2021;197:108331. https://doi.org/10.1016/j.comnet.2021.108331
6. Abid Ali AAM, Hazar MJ, Mabrouk M, Zrigui M. Proposal of a modified hash algorithm to increase blockchain security. Procedia Compute Sci. 2023;225:3265–3275. https://doi.org/10.1016/j.procs.2023.10.320
7. Tutueva AV, Karimov AI, Moysis L, Volos C, Butusov DN. Construction of one-way hash functions with increased key space using adaptive chaotic maps. Chaos Solitons Fractals. 2020;141:110344. https://doi.org/10.1016/j.chaos.2020.110344
8. Alawida M, Samsudin A, Alajarmeh N, Teh JS, Ahmad M, Alshoura WH. A novel hash function based on a chaotic sponge and DNA sequence. IEEE Access. 2021;9:17882–17897. https://doi.org/10.1109/ACCESS.2021.3049881
9. Kanso A, Yahyaoui H, Almulla M. Keyed hash function based on a chaotic map. Inf Sci. 2012;186(1):249–264. https://doi.org/10.1016/j.ins.2011.09.008
10. Serag Eldin SM, Abd El-Latif AA, Chelloug SA, Ahmad M, Eldeeb AH, Diab TO. Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences. IEEE Access. 2023;11:101694–101709. https://doi.org/10.1109/ACCESS.2023.3298545
11. Wang J, Liu G, Chen Y, Wang S. Construction and analysis of SHA-256 compression function based on chaos S-box. IEEE Access. 2021;9:61768–61777. https://doi.org/10.1109/ACCESS.2021.3071501
12. Abdoun N, El Assad S, Deforges O, Assaf R, Khalil M. Design and security analysis of two robust keyed hash functions based on chaotic neural networks. J Ambient Intell Humaniz Comput. 2020;11(5):2137–2161. https://doi.org/10.1007/s12652-019-01244-y
13. Saleh FF, Ali NHM. Generating streams of random key based on image chaos and genetic algorithm. Iraqi Journal of Science. 2022;63(8):3652–3661. https://doi.org/10.24996/ijs.2022.63.8.39
14. Taqi IA, Hameed SM. A new beta chaotic map with DNA encoding for color image encryption. Iraqi J Sci. 2020;61(9):2371–2384. https://doi.org/10.24996/ijs.2020.61.9.24
15. Abdulmunem IA., Harba ES., Harba HS. Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks, Baghdad Science Journal. 2021; 18(4):1317-1327. https://doi.org/10.21123/bsj.2021.18.4.1317
16. Abbaas HD, AbdulSalam AA. Hybrid efficient stream cipher key generator based on LFSR's and chaotic map. Ibn AL-Haitham Journal for Pure and Applied Sciences. 2024;37(1):464–476. https://doi.org/10.30526/37.1.3321
17. Hua Z, Zhou Y. One-dimensional nonlinear model for producing chaos. IEEE Trans Circuits Syst I Regul Pap. 2017;65(1):235–246. https://doi.org/10.1109/TCSI.2017.2717943
18. Shannon CE., Weaver W. The mathematical theory of communication. Champaign, IL: University of Illinois Press. 1949.
19. Federal Information Processing Standard (FIPS). Secure hash standard. FIPS PUB 180-2. National Institute of Standards and Technology; 2002.
20. Algredo-Badillo I, Feregrino-Uribe C, Cumplido R, Morales-Sandoval M. FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Microprocess Microsyst. 2013;37(6):750–757. https://doi.org/10.1016/j.micpro.2012.06.007
21. Kundu R, Dutta A. Cryptographic hash functions and attacks: A detailed study. Int J Adv Res Comput Sci. 2020;11(2). https://doi.org/10.26483/ijarcs.v11i2.6508
22. Verma R, Dhanda N, Nagar V. Enhancing security with in-depth analysis of brute-force attack on secure hashing algorithms. In: Trends in Electronics and Health Informatics: TEHI 2021; 2022:513–522. https://doi.org/10.1007/978-981-16-8826-3_44
23. Hasler M, Maistrenko YL. An introduction to the synchronization of chaotic systems: Coupled skew tent maps. IEEE Trans Circuits Syst I Fundam Theory Appl. 1997;44(10):856–866. https://doi.org/10.1109/81.633874
24. Lawnik M, Berezowski M. New chaotic system: M-map and its application in chaos-based cryptography. Symmetry. 2022;14(5):895. https://doi.org/10.3390/sym14050895
25. Elmanfaloty RA, Abou-Bakr E. Random property enhancement of a 1D chaotic PRNG with finite precision implementation. Chaos Solitons Fractals. 2019;118:134–144. https://doi.org/10.1016/j.chaos.2018.11.019
26. Umar T, Nadeem M, Anwer F. A new modified skew tent map and its application in pseudo-random number generator. Comput Stand Interfaces. 2024;89:103826. https://doi.org/10.1016/j.csi.2023.103826
27. Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Miles E, Stefan D, Levenson M, Vangel M, Banks DA. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22. 2010. https://doi.org/10.6028/NIST.SP.800-22r1a
28. Kwok-Wo W. A combined chaotic cryptographic and hashing scheme. Phys Lett A. 2003;307(5–6):292–298. https://doi.org/10.1016/S0375-9601(02)01770-X.
29. Di X, Xiaofeng L, Shaojiang D. One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fractals. 2005;24(1):65–71. https://doi.org/10.1016/j.chaos.2004.07.003
30. Zhang J, Wang X, Zhang W. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter. Phys Lett A. 2007;362(5–6):439–448. https://doi.org/10.1016/j.physleta.2006.10.052
31. Dworkin MJ. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Gaithersburg, MD, USA: Information Technology Laboratory National Institute of Standards and Technology. 2015. https://doi.org/10.6028/NIST.FIPS.202.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Ibn AL-Haitham Journal For Pure and Applied Sciences

This work is licensed under a Creative Commons Attribution 4.0 International License.
licenseTerms