A secure hash function based on feedback iterative structure

Yijun Yang, Fei Chen, Jianyong Chen, Yong Zhang, Kai Leung Yung

Research output: Journal article publicationJournal articleAcademic researchpeer-review

12 Citations (Scopus)


Rapid growth of internet data has created enormous security challenges on authenticity, availability and integrity protection of these outsourced data. Hash function is one of the main solutions to face these challenges. This paper proposes a feedback iterative structure of hash function which utilises the variable feedback to resist attacks. Furthermore, to accelerate message diffusion, two novel modules are designed, one for iteration and the other for truncation. Experimental results show that the proposed hash function can effectively resist existing attacks. Moreover, comparing with other existing hash functions, it displays better on statistical performance, collision resistance and avalanche.

Original languageEnglish
Pages (from-to)281-302
Number of pages22
JournalEnterprise Information Systems
Issue number3
Publication statusPublished - 16 Mar 2019


  • avalanche
  • collision resistance
  • compression function
  • feedback iterative structure
  • Hash function

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems and Management


Dive into the research topics of 'A secure hash function based on feedback iterative structure'. Together they form a unique fingerprint.

Cite this