BlueHash Algorithm Documentation - 中文文档
The BlueHash algorithm is a custom cryptographic hash function designed to generate secure hash values with varying bit lengths (128, 256, and 512 bits). It utilizes multiple rounds of transformations, including state updates, permutation functions, and constant generation, all of which contribute to the uniqueness and security of the final hash output.
This documentation provides an explanation of the algorithm's core components, including the state size, round counts, constant generation, and state update transformations. Mathematical formulas are provided to describe each step in the process.
use std::fmt::Write;
use BlueHash::{BlueHashCore, Digest, DigestSize};
fn main() {
// Test Data
let test_data = b"Hello, world! This is a test message for BlueHash!";
// Initialize the BlueHash128 hasher
let mut hasher128 = BlueHashCore::new(DigestSize::Bit128);
hasher128.update(test_data);
let result128 = hasher128.finalize();
println!("BlueHash128 Result: {}", to_hex_string(&result128));
// Initialize the BlueHash256 hasher
let mut hasher256 = BlueHashCore::new(DigestSize::Bit256);
hasher256.update(test_data);
let result256 = hasher256.finalize();
println!("BlueHash256 Result: {}", to_hex_string(&result256));
// Initialize the BlueHash512 hasher
let mut hasher512 = BlueHashCore::new(DigestSize::Bit512);
hasher512.update(test_data);
let result512 = hasher512.finalize();
println!("BlueHash512 Result: {}", to_hex_string(&result512));
}
/// Convert byte array to hex string
fn to_hex_string(bytes: &[u8]) -> String {
let mut hex = String::new();
for byte in bytes {
write!(&mut hex, "{:02x}", byte).unwrap();
}
hex
}
BlueHash128 Result: 882864a37a8994e12161d27dfa340df0
BlueHash256 Result: 94cf55cae663dce02e08c3a5660e55ef2e08c3a5660e55ef2e08c3a5660e55ef
BlueHash512 Result: aa9501014ff3013643de6edbcf9d7a4543de6edbcf9d7a4543de6edbcf9d7a4543de6edbcf9d7a4543de6edbcf9d7a4543de6edbcf9d7a4543de6edbcf9d7a45
The BlueHash algorithm uses a fixed state size and different digest lengths based on the desired output size.
- State Size: 25 64-bit words, i.e., ( STATE_SIZE = 25 ).
- Digest Length: Based on the digest size, which can be 128, 256, or 512 bits.
The number of rounds and the output length for each digest size are as follows:
The generate_constants
function generates a unique constant for each round of the hash transformation. The constant is based on several factors, including the round number, input data, and predefined constants.
The constant is generated using the following formula:
Where:
- ( p ) is a fixed prime constant.
- ( r ) is the round number.
round_factor
is a function of the round number.extra_prime
is a large constant prime.noise
is generated from the input data and round number.hash_length
is the length of the final digest.
This ensures that each round has a unique constant, enhancing the security and randomness of the hash process.
The update
and permute
functions implement the core transformation logic of the algorithm. Each round involves updating the state using the current round constants and applying various bitwise operations to achieve diffusion and confusion.
The update formula for the state state[i]
at round r
is as follows:
Where:
state[i]
is thei^{th}
element of the state array.local vars
are variables derived from neighboring state values.<<
and>>
represent bitwise left and right shifts, respectively.⊕
represents the bitwise XOR operation.&
represents the bitwise AND operation.
This transformation ensures that each round of the hash function introduces non-linear mixing, which helps in achieving both diffusion (small input changes lead to large output changes) and confusion (output is not easily related to the input).
The final hash is produced by extracting bits from the internal state after all rounds of transformations are complete. The final digest is generated by taking chunks of 64 bits from the state and converting them to bytes.
The formula for generating the final digest is:
Where:
digest[j]
is thej^{th}
byte of the final hash.state[j / 8 mod STATE_SIZE]
represents the value taken from the state array.
The resulting bytes are concatenated to form the final hash value, which is the output of the finalize
function.
The security of the BlueHash algorithm is based on the following principles:
- Uniqueness: Each round uses a unique constant that depends on the round number, input data, and a series of primes. This ensures that no two rounds produce the same transformation.
- Collision Resistance: The non-linear transformations and mixing of state variables at each round make it computationally difficult to find two distinct inputs that produce the same hash output.
- Diffusion and Confusion: The bitwise operations (XOR, AND, shifts) used in the state update function ensure that small changes in the input lead to significantly different hash values, which is the essence of a good cryptographic hash function.
By adhering to these principles, BlueHash is designed to be a robust cryptographic hash function, resistant to attacks such as collision finding and pre-image attacks.
1500 Sample | SHA3 256 | SHA3 512 | BlueHash 128 | BlueHash 256 | BlueHash 512 |
---|---|---|---|---|---|
R^2 | 0.7966978 | 0.7135882 | 0.4950626 | 0.7290226 | 0.6919036 |
Mean | 334.45 ns | 336.50 ns | 838.63 µs | 1.0267 ms | 1.3917 ms |
std. Dev | 19.989 ns | 14.845 ns | 23.557 µs | 20.248 µs | 31.998 µs |
Median | 333.74 ns | 334.67 ns | 834.35 µs | 1.0234 ms | 1.3859 ms |
MAD | 3.5463 ns | 2.8191 ns | 10.953 µs | 12.335 µs | 17.597 µs |
-
Resistance to Quantum Attacks: Provides greater resistance to quantum attacks through the mechanism of LWE noise and constant generation.
-
Higher Randomness and Complexity: Utilizes dynamic generation of constants, increasing the unpredictability of the hash algorithm. This adds complexity and makes the algorithm more resistant to differential attacks.
-
Stronger State Update and Replacement: Offers improved resistance to both conventional and quantum attacks through more diverse bit operations and hybrid operations.
-
Enhanced Noise Generation Mechanism: The addition of LWE noise not only increases security but also enhances defense, particularly against quantum computing.
-
Flexibility: Enables flexible adjustment of rounds and other parameters according to different hash lengths, optimizing performance while ensuring security.
-
Higher Performance Overhead: Multiple rounds of complex operations and noise generation increase the computational overhead and may impact efficiency in big data processing.
-
Higher Memory Consumption: More local variables and state storage requirements may lead to performance bottlenecks in low-memory environments.
-
Lack of Standardization and Auditing: Compared to SHA3-256, BlueHash lacks extensive security auditing and community validation, which may affect its trustworthiness in certain applications.
The BlueHash algorithm is a custom cryptographic hash function that leverages multiple rounds of complex transformations to generate secure hashes of varying lengths. It utilizes a fixed state size, round-based transformations, and constant generation to ensure the uniqueness and security of the final output.
USDT : Arbitrum One Network: 0x4051d34Af2025A33aFD5EacCA7A90046f7a64Bed | USDC: Arbitrum One Network: 0x4051d34Af2025A33aFD5EacCA7A90046f7a64Bed | Dash: Dash Network: XuJwtHWdsYzfLawymR3B3nDdS2W8dHnxyR |
---|