Based on Sponge Construction with Non-Linear Feedback Shift Registers
Hash-One is a lightweight cryptographic hash function designed specifically for constrained devices such as RFID tags, wireless sensors, and other embedded systems. This implementation is based on the research paper published in IET Information Security by Bilal et al. (2016).
The function uses a sponge construction methodology, which involves two main phases: the absorbing phase where input file bits are mixed with the internal state, and the squeezing phase where the final fixed-length hash is extracted from the altered internal state.
Optimized for constrained devices with minimal hardware requirements (1006 Gate Equivalents).
Provides 80-bit security against collision attacks and 160-bit preimage resistance.
Even tiny changes in input result in completely different hash outputs.
Uses proven sponge methodology with non-linear feedback shift registers.
Hash-One utilizes two non-linear feedback shift registers (NFSRs) of sizes 80 and 81 bits. The security is based on a permutation function that updates these registers using carefully designed Boolean functions. The internal state is initialized with the first 161 bits of the mathematical constant π (pi), ensuring a strong cryptographic foundation.
The algorithm processes input files bit by bit, mixing them with the internal state through XOR operations. The avalanche effect ensures that even the smallest change in input produces a completely different hash output, making it ideal for integrity verification and digital document authentication.
State with π bits
Input file bits
NFSR operations
160-bit hash output
Ready to generate secure hashes for your files? Click the button below to access the Hash-One generator tool.
🚀 Go to Hash GeneratorThis Hash-One implementation is developed as part of academic coursework at Amrita Vishwa Vidyapeetham, Coimbatore. The project demonstrates the practical implementation of lightweight cryptographic hash functions for educational and research purposes.
Course Integration: This project is part of 20CYS202 - User Interface Design and 20CYS205 - Modern Cryptography, showcasing the intersection of cryptographic algorithms and user experience design.
Educational Purpose: While this implementation follows the research specifications, it is primarily designed for educational demonstration. It should not be used in production cryptographic applications without further security analysis.