{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T10:52:56Z","timestamp":1773485576841,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:00:00Z","timestamp":1773446400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:00:00Z","timestamp":1773446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100008809","name":"University of Hail","doi-asserted-by":"publisher","award":["RG-23 120"],"award-info":[{"award-number":["RG-23 120"]}],"id":[{"id":"10.13039\/501100008809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-026-08352-5","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T10:09:15Z","timestamp":1773482955000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New DNA-hash-based message authentication codes"],"prefix":"10.1007","volume":"82","author":[{"given":"Hazem M.","family":"Bahig","sequence":"first","affiliation":[]},{"given":"Dieaa I.","family":"Nassr","sequence":"additional","affiliation":[]},{"given":"Ibrahim M.","family":"Alseadoon","sequence":"additional","affiliation":[]},{"given":"Mohamed A. G.","family":"Hazber","sequence":"additional","affiliation":[]},{"given":"Hatem M.","family":"Bahig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,14]]},"reference":[{"key":"8352_CR1","doi-asserted-by":"crossref","unstructured":"Abbasy M, Manaf A, Shahidan M (2011) Data hiding method based on DNA basic characteristics. Springer, pp 53\u201362","DOI":"10.1007\/978-3-642-22603-8_5"},{"issue":"11","key":"8352_CR2","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman L (1994) Molecular computation of solutions to combinatorial problems. Science 266(11):1021\u20131024","journal-title":"Science"},{"key":"8352_CR3","volume":"83","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) A novel DNA tree-based chaotic image encryption algorithm. J Inform Secur Appl 83:103791","journal-title":"J Inform Secur Appl"},{"key":"8352_CR4","doi-asserted-by":"publisher","first-page":"17882","DOI":"10.1109\/ACCESS.2021.3049881","volume":"9","author":"M Alawida","year":"2021","unstructured":"Alawida M, Samsudin A, Alajarmeh N, Teh J, Ahmad M, Alshoura W (2021) A novel hash function based on a chaotic sponge and DNA sequence. IEEE Access 9:17882\u201317897","journal-title":"IEEE Access"},{"key":"8352_CR5","doi-asserted-by":"publisher","first-page":"00093","DOI":"10.1051\/bioconf\/20249700093","volume":"97","author":"F Al-Shareefi","year":"2024","unstructured":"Al-Shareefi F, Al-Barmani Z (2024) Comparing two cryptographic hash algorithms: SHA-512 and whirlpool\u2014a case study on file integrity monitoring. BIO Web Conf 97:00093","journal-title":"BIO Web Conf"},{"key":"8352_CR6","doi-asserted-by":"crossref","unstructured":"Aoki K, Guo J, Matusiewicz K, Sasaki Y, Wang L (2009) Preimages for step-reduced sha-2. In: Advances in cryptology-ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6\u201310, 2009. Proceedings, vol. 5912, Lecture Notes in Computer Science. Springer, pp 578\u2013597","DOI":"10.1007\/978-3-642-10366-7_34"},{"key":"8352_CR7","unstructured":"Bahig H, Nassr DI (2018) DNA-based AES with silent mutations. Arab J Sci Eng 1\u201315, 9"},{"key":"8352_CR8","doi-asserted-by":"crossref","unstructured":"Barreto PS, Rijmen V (2003) Whirlpool. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, Boston, pp 1384\u20131385","DOI":"10.1007\/978-1-4419-5906-5_626"},{"issue":"8","key":"8352_CR9","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1016\/j.tibtech.2024.02.002","volume":"42","author":"C Berezin","year":"2024","unstructured":"Berezin C, Peccoud S, Kar D, Peccoud J (2024) Cryptographic approaches to authenticating synthetic DNA sequences. Trends Biotechnol 42(8):1002\u20131016","journal-title":"Trends Biotechnol"},{"issue":"1\u20133","key":"8352_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/S0166-218X(96)00058-3","volume":"71","author":"D Boneh","year":"1996","unstructured":"Boneh D, Dunworth C, Lipton R, Sgall J (1996) On the computational power of DNA. Discret Appl Math 71(1\u20133):79\u201394","journal-title":"Discret Appl Math"},{"key":"8352_CR11","doi-asserted-by":"crossref","unstructured":"Boneh D, Dunworth C, Lipton R (1995) Breaking DES using a molecular computer. In: DNA based computers, proceedings of a DIMACS workshop, Princeton, New Jersey, USA, April 4, pp 37\u201366","DOI":"10.1090\/dimacs\/027\/04"},{"key":"8352_CR12","doi-asserted-by":"crossref","unstructured":"Chelamkuri PM, Bhavya Reddy E, Jonna A (2020) Secure data transfer through whirlpool\u2013a miyaguchi-preneel mode. In: Jyothi S, Mamatha DM, Satapathy SC, Srujan Raju K, Favorskaya MN (eds) Advances in Computational and Bio-Engineering. Springer, Cham, pp 127\u2013134","DOI":"10.1007\/978-3-030-46939-9_11"},{"key":"8352_CR13","doi-asserted-by":"publisher","unstructured":"Chen S, Guo J, List E, Shi D, Zhang T (2024) Diving deep into the preimage security of AES-like hashing. In: EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science. Springer, pp 398\u2013426. https:\/\/doi.org\/10.1007\/978-3-031-58716-0_14","DOI":"10.1007\/978-3-031-58716-0_14"},{"key":"8352_CR14","doi-asserted-by":"publisher","first-page":"303","DOI":"10.23919\/CSMS.2024.0015","volume":"4","author":"Z Chong","year":"2024","unstructured":"Chong Z, Wang C, Zhang H, Ma P, Li X (2024) Image encryption algorithm based on a hybrid model of novel memristive hyperchaotic systems, DNA coding, and hash functions. Complex Syst Model Simul 4:303\u2013319. https:\/\/doi.org\/10.23919\/CSMS.2024.0015","journal-title":"Complex Syst Model Simul"},{"key":"8352_CR15","doi-asserted-by":"crossref","unstructured":"Cui G, Qin L, Wang Y, Zhang X (2008) An encryption scheme using DNA technology. In: Third International Conference on Bio-Inspired Computing: Theories and Applications, pp 37\u201342","DOI":"10.1109\/BICTA.2008.4656701"},{"key":"8352_CR16","unstructured":"eBacs. https:\/\/bench.cr.yp.to\/results-hash\/amd64-comet.html. Accessed 21\u201301-2026"},{"key":"8352_CR17","doi-asserted-by":"publisher","first-page":"101694","DOI":"10.1109\/ACCESS.2023.3298545","volume":"11","author":"S Eldin","year":"2023","unstructured":"Eldin S, El-Latif A, Chelloug S, Ahmad M, Eldeeb A, Diab T, Sobky W, Zaky H (2023) Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences. IEEE Access 11:101694\u2013101709","journal-title":"IEEE Access"},{"key":"8352_CR18","unstructured":"Feldman J, Misenar S, Conrad E (2023) CISSP\u00aeStudy Guide, 4th Edn"},{"key":"8352_CR19","first-page":"167","volume-title":"DNA-based cryptography","author":"A Gehani","year":"2004","unstructured":"Gehani A, LaBean T, Reif J (2004) DNA-based cryptography. Springer, Berlin, Heidelberg, pp 167\u2013188"},{"key":"8352_CR20","unstructured":"Gr\u00f8stl. https:\/\/www.groestl.info\/"},{"key":"8352_CR21","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"8352_CR22","doi-asserted-by":"crossref","unstructured":"Guo J, Sasaki Y, Wang L, Wu S (2013) Cryptanalysis of HMAC\/NMAC-Whirlpool. In: Sako K, Sarkar P (eds) Advances in Cryptology-ASIACRYPT 2013. ASIACRYPT 2013. Lecture Notes in Computer Science, vol 8270. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-42045-0_2"},{"key":"8352_CR23","doi-asserted-by":"crossref","unstructured":"Hilewitz Y, Yin Y, Lee R (2008) Accelerating the whirlpool hash function using parallel table lookup and fast cyclical permutation. In: Nyberg K (eds) Fast software encryption. FSE 2008. Lecture notes in computer science, vol 5086. Springer, Berlin, Heidelberg, pp 173\u2013188","DOI":"10.1007\/978-3-540-71039-4_11"},{"key":"8352_CR24","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.3390\/math13081330","volume":"13","author":"L Huang","year":"2025","unstructured":"Huang L, Ding C, Bao Z, Chen H, Wan C (2025) A DNA encoding image encryption algorithm based on chaos. Mathematics 13:1330. https:\/\/doi.org\/10.3390\/math13081330","journal-title":"Mathematics"},{"key":"8352_CR25","doi-asserted-by":"crossref","unstructured":"Indesteege S, Mendel F, Preneel B, Rechberger C (2009) Collisions and other non-random properties for step-reduced sha-256. In: Selected areas in cryptography. Springer, pp 276\u2013293","DOI":"10.1007\/978-3-642-04159-4_18"},{"issue":"1","key":"8352_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.15388\/Informatica.2015.38","volume":"26","author":"K Kazlauskas","year":"2015","unstructured":"Kazlauskas K, Vaicekauskas G, Smaliukas R (2015) An algorithm for key-dependent S-Box generation in block cipher system. Informatica 26(1):51\u201365. https:\/\/doi.org\/10.15388\/Informatica.2015.38","journal-title":"Informatica"},{"key":"8352_CR27","doi-asserted-by":"crossref","unstructured":"Kelsey J, Kohno T (2006) Herding hash functions and the nostradamus attack. In: Advances in cryptology-EUROCRYPT 2006. Springer, pp 183\u2013200","DOI":"10.1007\/11761679_12"},{"issue":"1","key":"8352_CR28","doi-asserted-by":"publisher","first-page":"20003","DOI":"10.1038\/s41598-025-03898-5","volume":"15","author":"V Kumaran","year":"2025","unstructured":"Kumaran V, Manikandan T, Dhanaraj R, Al-Shehari T, Alsadhan N, Selvarajan S (2025) A secure medical image encryption technique based on DNA cryptography with elliptic curves. Sci Rep 15(1):20003","journal-title":"Sci Rep"},{"key":"8352_CR29","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s00145-013-9166-5","volume":"28","author":"M Lamberger","year":"2015","unstructured":"Lamberger M, Mendel F, Schl\u00e4ffer M, Rechberger C, Rijmen V (2015) The rebound attack and subspace distinguishers: application to whirlpool. J Cryptol 28:257\u2013296. https:\/\/doi.org\/10.1007\/s00145-013-9166-5","journal-title":"J Cryptol"},{"key":"8352_CR30","doi-asserted-by":"crossref","unstructured":"Landge I, Satopay H (2018) Secured IoT through hashing using $$\\textbf{MD5} $$. In: 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp 1\u20135","DOI":"10.1109\/AEEICB.2018.8481007"},{"key":"8352_CR31","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/s11227-025-06996-3","volume":"81","author":"L Lawrence","year":"2025","unstructured":"Lawrence L, Shreelekshmi R (2025) Double salted HMAC signature with blockchain for faster and secure video integrity verification. J Supercomput 81:598","journal-title":"J Supercomput"},{"key":"8352_CR32","doi-asserted-by":"publisher","unstructured":"Li Y, Liu F, Wang G, Qian H, Jia K, Kon X (2025) New collision attacks on round-reduced SHA-512. In: Tauman Kalai Y, Kamara SF (eds) Advances in cryptology\u2014CRYPTO 2025. CRYPTO 2025. Lecture notes in computer science, vol 16004. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-032-01901-1_7","DOI":"10.1007\/978-3-032-01901-1_7"},{"key":"8352_CR33","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1126\/science.7725098","volume":"268","author":"R Lipton","year":"1995","unstructured":"Lipton R (1995) Using DNA to solve np-complete problems. Science 268:542\u2013545","journal-title":"Science"},{"key":"8352_CR34","volume-title":"Handbook of applied cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes A, Vanstone S, van Oorschot P (1996) Handbook of applied cryptography, 1st edn. CRC Press Inc, London","edition":"1"},{"issue":"34","key":"8352_CR35","first-page":"1","volume":"27","author":"DI Nassr","year":"2019","unstructured":"Nassr DI (2019) Secure hash algorithm-2 formed on DNA. J Egypt Math Soc 27(34):1\u201320","journal-title":"J Egypt Math Soc"},{"key":"8352_CR36","unstructured":"National Institute of Standards and Technology (2015) SHA-3 standard: permutation-based hash and extendable-output functions: FiPS PUB 202. pub-NIST"},{"key":"8352_CR37","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology. FIPS PUB 180\u20134: Secure Hash Standard. pub-NIST, March 2012. https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"8352_CR38","unstructured":"Panwar K, Purwar R, Jain A (2019) Design of a SHA-2 hash based image encryption scheme using 1D chaotic systems and DNA sequences. In: 2019 International Conference On Computing, Power and Communication Technologies (GUCON), pp 769\u2013773"},{"key":"8352_CR39","first-page":"1","volume":"1321","author":"RL Rivest","year":"1992","unstructured":"Rivest RL (1992) The $$\\textbf{MD5} $$ message-digest algorithm. RFC 1321:1\u201321","journal-title":"RFC"},{"key":"8352_CR40","doi-asserted-by":"crossref","unstructured":"Sabry M, Hashem M, Nazmy T, Khalifa ME (2015) Design of DNA-based advanced encryption standard (AES). In: 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS), pp 390\u2013397","DOI":"10.1109\/IntelCIS.2015.7397250"},{"key":"8352_CR41","doi-asserted-by":"crossref","unstructured":"Sanadhya S, Sarkar P (2008) New collision attacks against up to 24-step sha-2. In: Progress in cryptology-INDOCRYPT 2008. Springer, pp 91\u2013103","DOI":"10.1007\/978-3-540-89754-5_8"},{"key":"8352_CR42","doi-asserted-by":"publisher","unstructured":"Shaw H, Hussein S, Helgert H (2010) Prototype genomics-based keyed-hash message authentication code protocol. In: 2010 2nd International Conference on Evolving Internet, Valencia, Spain, pp 131\u2013136. https:\/\/doi.org\/10.1109\/INTERNET.2010.31","DOI":"10.1109\/INTERNET.2010.31"},{"key":"8352_CR43","first-page":"122","volume-title":"Fast multiplication in finite fields GF($$2^n$$)","author":"J Silverman","year":"1999","unstructured":"Silverman J (1999) Fast multiplication in finite fields GF($$2^n$$). Springer, Berlin, pp 122\u2013134"},{"issue":"1","key":"8352_CR44","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/01611190500380090","volume":"30","author":"W Stallings","year":"2006","unstructured":"Stallings W (2006) The whirlpool secure hash function. Cryptologia 30(1):55\u201367","journal-title":"Cryptologia"},{"key":"8352_CR45","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2022","unstructured":"Stallings W (2022) Cryptography and network security: principles and practice. Pearson Education Limited, London"},{"key":"8352_CR46","doi-asserted-by":"crossref","unstructured":"Wang X, Yu H (2005) How to break MD5 and other hash functions. In: Cramer R (eds) Advances in cryptology\u2014EUROCRYPT. EUROCRYPT 2005. Lecture notes in computer science, vol. 3494. Springer, Berlin, Heidelberg","DOI":"10.1007\/11426639_2"},{"key":"8352_CR47","unstructured":"Zalewski P (2008) FPGA design and performance analysis of SHA-512, whirlpool and PHASH hashing functions. Rochester Institute of Technology, Master\u2019s thesis. RIT Scholar Works, repository.rit.edu\/theses\/3213\/"},{"key":"8352_CR48","unstructured":"Zalewski P, \u0141ukowiak M, Radziszowski S (2010) Case study on FPGA performance of parallel hash functions. In: Proceedings of the 16-th International Conference Mixed Design of Integrated Circuits and Systems, June 2009, \u0141\u00f3d\u2019z, Poland., in Przeglkad Elektrotechniczny\/Electrical Review, R 86 NR 11a, pp 151\u2013155"},{"key":"8352_CR49","doi-asserted-by":"publisher","first-page":"24993","DOI":"10.1007\/s11042-020-09111-1","volume":"79","author":"E Zefreh","year":"2020","unstructured":"Zefreh E (2020) An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed Tools Appl 79:24993\u201325022","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"8352_CR50","doi-asserted-by":"publisher","first-page":"796","DOI":"10.3390\/e27080796","volume":"27","author":"W Zhou","year":"2025","unstructured":"Zhou W, Li X, Xin Z (2025) Image encryption algorithm based on an improved tent map and dynamic DNA coding. Entropy (Basel) 27(8):796. https:\/\/doi.org\/10.3390\/e27080796","journal-title":"Entropy (Basel)"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-026-08352-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-026-08352-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-026-08352-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T10:09:20Z","timestamp":1773482960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-026-08352-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,14]]},"references-count":50,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["8352"],"URL":"https:\/\/doi.org\/10.1007\/s11227-026-08352-5","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,14]]},"assertion":[{"value":"6 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"257"}}