Hash-One: A Lightweight Cryptographic Hash Function

Based on Sponge Construction with Non-Linear Feedback Shift Registers

Introduction to Hash-One

Hash-One is a lightweight cryptographic hash function designed specifically for constrained devices such as RFID tags, wireless sensors, and other embedded systems. This implementation is based on the research paper published in IET Information Security by Bilal et al. (2016).

The function uses a sponge construction methodology, which involves two main phases: the absorbing phase where input file bits are mixed with the internal state, and the squeezing phase where the final fixed-length hash is extracted from the altered internal state.

Key Features

🔧 Lightweight Design

Optimized for constrained devices with minimal hardware requirements (1006 Gate Equivalents).

🔒 Strong Security

Provides 80-bit security against collision attacks and 160-bit preimage resistance.

🌊 Avalanche Effect

Even tiny changes in input result in completely different hash outputs.

🧽 Sponge Construction

Uses proven sponge methodology with non-linear feedback shift registers.

Technical Specifications

  • State Size: 161 bits
  • Hash Output: 160 bits
  • Capacity: 160 bits
  • Rate: 1 bit
  • Security Level: 80 bits
  • Hardware Area: 1006 GE

How It Works

Hash-One utilizes two non-linear feedback shift registers (NFSRs) of sizes 80 and 81 bits. The security is based on a permutation function that updates these registers using carefully designed Boolean functions. The internal state is initialized with the first 161 bits of the mathematical constant π (pi), ensuring a strong cryptographic foundation.

The algorithm processes input files bit by bit, mixing them with the internal state through XOR operations. The avalanche effect ensures that even the smallest change in input produces a completely different hash output, making it ideal for integrity verification and digital document authentication.

Hash-One Workflow

1. Initialize

State with π bits

2. Absorb

Input file bits

3. Process

NFSR operations

4. Squeeze

160-bit hash output

📚 Detailed Workflow Explanation

Try Hash-One Generator!

⚠️ Please Note: This implementation is a proof-of-concept and processes files bit-by-bit in the browser. For optimal performance, it is best suited for smaller files (less than 100 KB). Larger files may cause the browser to become unresponsive.

Ready to generate secure hashes for your files? Click the button below to access the Hash-One generator tool.

🚀 Go to Hash Generator

References

Primary Research Paper:
Bilal, M., Shabbir, M., Tahir, Y., Shah, T., Bashir, H., & Abbas, G. (2016). Hash-One: A lightweight cryptographic hash function. IET Information Security, 10(5), 225-231. https://doi.org/10.1049/iet-ifs.2015.0385
Sponge Construction Reference:
Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2011). Cryptographic sponge functions. Submission to NIST (round 3).

About This Project

This Hash-One implementation is developed as part of academic coursework at Amrita Vishwa Vidyapeetham, Coimbatore. The project demonstrates the practical implementation of lightweight cryptographic hash functions for educational and research purposes.

Course Integration: This project is part of 20CYS202 - User Interface Design and 20CYS205 - Modern Cryptography, showcasing the intersection of cryptographic algorithms and user experience design.

Educational Purpose: While this implementation follows the research specifications, it is primarily designed for educational demonstration. It should not be used in production cryptographic applications without further security analysis.