Keçeci Hash Algorithm (Keçeci Hash Algoritması), KHA-256
Project description
Keçeci Hash Algorithm (Keçeci Hash Algoritması), KHA-256
KEÇECİ HASH ALGORİTMASI (KHA-256) 🇹🇷/Eng
Performanstan Fedakarlık Edilerek Güvenlik Maksimize Edilmiş Hash Algoritması
Hash Algorithm with Security Maximized at the Sacrifice of Performance
📖 İçindekiler / Table of Contents
🇹🇷 Türkçe
🚀 Özellikler
🔐 Güvenlik Öncelikli
- 256-bit hash çıktısı - Endüstri standardı
- Güçlü Avalanche Etkisi - %49.5-50.5 ideal aralık
- Kuantum Dirençli Tasarım - Post-kuantum güvenlik
- Çoklu Keçeci Sayısı Türleri - 22 farklı matematiksel sistem
- Entropi İnjeksiyonu - Zaman ve sistem bazlı entropy
- Çift Hashleme - Ek güvenlik katmanı
⚡ Performans Optimizasyonları
- Vektörel İşlemler - NumPy ile optimize edilmiş
- Akıllı Önbellekleme - Tekrarlanan işlemler için
- Batch İşleme - Toplu hash işlemleri için optimize
- Paralel İşleme Hazır - (Opsiyonel)
🧪 Kapsamlı Testler
- Avalanche Testi - Bit değişim analizi
- Çakışma Testi - Hash çakışmalarının önlenmesi
- Uniformluk Testi - Bit dağılım analizi
- Performans Benchmark - Hız ve verimlilik testleri
📦 Kurulum
Gereksinimler
- Python 3.11 veya üzeri
- NumPy 2.3.0+
- KeçeciNumbers 0.8.4+
Pip ile Kurulum
pip install -U kececinumbers==0.8.4
pip install -U numpy>=2.3.0
Manuel Kurulum
# Repository'yi klonla
git clone https://github.com/WhiteSymmetry/kha256.git
cd kha256
# Bağımlılıkları yükle
pip install -r requirements.txt
# Geliştirici modunda yükle
pip install -e .
🎯 Hızlı Başlangıç
Temel Hashleme
from kha256 import quick_hash
# Basit metin hash'i
hash_result = quick_hash("Merhaba Dünya!")
print(f"Hash: {hash_result}")
# Örnek: 8f3a2b1c5d7e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5
Şifre Hashleme
from kha256 import hash_password
password = "GizliŞifre123!"
hashed_password = hash_password(password)
print(f"Hashlenmiş Şifre: {hashed_password[:80]}...")
Komut Satırı Kullanımı
# Test çalıştır
python -m kha256 --test
# Tek hash oluştur
python -m kha256 --hash "Merhaba Dünya!"
# Performans testi
python -m kha256 --benchmark
# Demo modu
python -m kha256 --demo
🔧 Detaylı Kullanım
Özelleştirilmiş Hasher
from kha256 import FortifiedKhaHash256, FortifiedConfig
# Özel konfigürasyon
config = FortifiedConfig(
iterations=20, # Daha fazla iterasyon
shuffle_layers=16, # Daha fazla karıştırma katmanı
salt_length=128, # Daha uzun tuz
double_hashing=True, # Çift hashleme aktif
enable_quantum_resistance=True # Kuantum direnç
)
# Hasher oluştur
hasher = FortifiedKhaHash256(config)
# Veriyi hash'le
data = "Önemli gizli veri"
salt = secrets.token_bytes(64) # Güçlü tuz
hash_result = hasher.hash(data, salt)
print(f"Hash: {hash_result}")
Batch İşlemleri
from kha256 import FortifiedKhaHash256
hasher = FortifiedKhaHash256()
# Çoklu veri hash'leme
data_list = ["veri1", "veri2", "veri3", "veri4"]
hashes = [hasher.hash(data) for data in data_list]
# Dosya hash'leme
def hash_file(file_path):
with open(file_path, 'rb') as f:
file_data = f.read()
return hasher.hash(file_data)
🛡️ Güvenlik Testleri
Avalanche Testi
from kha256 import FortifiedKhaHash256
hasher = FortifiedKhaHash256()
results = hasher.test_avalanche_effect(samples=100)
print(f"Ortalama Bit Değişimi: {results['avg_bit_change_percent']:.2f}%")
print(f"İdeal Aralıkta: {results['in_ideal_range']}")
print(f"Durum: {results['status']}")
# Çıktı: EXCELLENT, GOOD, ACCEPTABLE veya POOR
Çakışma Testi
results = hasher.test_collision_resistance(samples=5000)
print(f"Çakışma Sayısı: {results['collisions']}")
print(f"Çakışma Oranı: {results['collision_rate_percent']:.6f}%")
Kapsamlı Test
from kha256 import run_comprehensive_test
# Tüm testleri çalıştır
hasher = run_comprehensive_test()
📊 Performans
Benchmark Sonuçları
Boyut Ortalama Süre Verim
------ ------------- ------
64 byte ? ms ? MB/s
256 byte ? ms ? MB/s
1 KB ? ms ? MB/s
4 KB ? ms ? MB/s
16 KB ? ms ? MB/s
Performans Optimizasyonları
from kha256 import FortifiedConfig
# Hızlı mod (daha az güvenlik, daha hızlı)
fast_config = FortifiedConfig(
iterations=8,
shuffle_layers=6,
components_per_hash=12,
enable_quantum_resistance=False,
double_hashing=False
)
# Güvenlik mod (maksimum güvenlik)
secure_config = FortifiedConfig(
iterations=24,
shuffle_layers=20,
components_per_hash=32,
enable_quantum_resistance=True,
double_hashing=True,
triple_compression=True
)
📚 API Referansı
Ana Sınıflar
FortifiedKhaHash256
Ana hash sınıfı.
class FortifiedKhaHash256:
def __init__(self, config: Optional[FortifiedConfig] = None)
def hash(self, data: Union[str, bytes], salt: Optional[bytes] = None) -> str
def test_avalanche_effect(self, samples: int = 100) -> Dict[str, Any]
def test_collision_resistance(self, samples: int = 5000) -> Dict[str, Any]
def test_uniformity(self, samples: int = 5000) -> Dict[str, Any]
def get_stats(self) -> Dict[str, Any]
FortifiedConfig
Konfigürasyon sınıfı.
@dataclass
class FortifiedConfig:
output_bits: int = 256
hash_bytes: int = 32
iterations: int = 16
rounds: int = 8
components_per_hash: int = 20
salt_length: int = 96
shuffle_layers: int = 12
diffusion_rounds: int = 9
avalanche_boosts: int = 6
enable_quantum_resistance: bool = True
enable_post_quantum_mixing: bool = True
double_hashing: bool = True
triple_compression: bool = True
memory_hardening: bool = True
entropy_injection: bool = True
time_varying_salt: bool = True
context_sensitive_mixing: bool = True
cache_enabled: bool = False
parallel_processing: bool = False
Yardımcı Fonksiyonlar
# Hızlı hash
quick_hash(data: Union[str, bytes]) -> str
# Şifre hashleme
hash_password(password: str, salt: Optional[bytes] = None) -> str
# Hasher oluşturma
generate_fortified_hasher() -> FortifiedKhaHash256
# Test çalıştırma
run_comprehensive_test() -> FortifiedKhaHash256
# Benchmark
benchmark_hash(data_sizes: List[int] = [64, 256, 1024, 4096]) -> Dict[str, Any]
Geliştirme Ortamı Kurulumu
# Repository'yi klonla
git clone https://github.com/mehmetkececi/kha256.git
cd kha256
# Sanal ortam oluştur
python -m venv venv
source venv/bin/activate # Linux/Mac
# veya
venv\Scripts\activate # Windows
# Bağımlılıkları yükle
pip install -r requirements.txt
pip install -r requirements-dev.txt # Geliştirme bağımlılıkları
# Testleri çalıştır
pytest tests/
python -m kha256 --test
Kod Standartları
- PEP 8 stil rehberi
- Type hint'ler kullanılmalı
- Docstring'ler yazılmalı
- Unit testler eklenmeli
📄 Lisans
Bu proje AGPL-3.0 lisansı altında lisanslanmıştır. Detaylar için LICENSE dosyasına bakın.
Copyright 2025 Mehmet Keçeci
Bu program özgür yazılımdır: Özgür Yazılım Vakfı tarafından yayınlanan
GNU Affero Genel Kamu Lisansı’nın 3. ya da (isteğinize bağlı olarak) daha
sonraki sürümlerinin koşulları altında yeniden dağıtabilir ve/veya
değiştirebilirsiniz.
Bu program, yararlı olması umuduyla dağıtılmış olup, hiçbir garantisi yoktur;
hatta SATILABİLİRLİĞİ veya ŞAHİSİ BİR AMACA UYGUNLUĞU için dahi garanti
vermez. Daha fazla ayrıntı için GNU Affero Genel Kamu Lisansı’na bakınız.
Bu programla birlikte GNU Affero Genel Kamu Lisansı’nın bir kopyasını
almış olmalısınız. Almadıysanız, <http://www.gnu.org/licenses/> adresine bakınız.
English
🚀 Features
🔐 Security First
- 256-bit hash output - Industry standard
- Strong Avalanche Effect - 49.5-50.5% ideal range
- Quantum-Resistant Design - Post-quantum security
- Multiple Keçeci Number Types - 22 different mathematical systems
- Entropy Injection - Time and system-based entropy
- Double Hashing - Additional security layer
⚡ Performance Optimizations
- Vectorized Operations - Optimized with NumPy
- Smart Caching - For repeated operations
- Batch Processing - Optimized for bulk hashing
- Parallel Processing Ready - (Optional)
🧪 Comprehensive Tests
- Avalanche Test - Bit change analysis
- Collision Test - Hash collision prevention
- Uniformity Test - Bit distribution analysis
- Performance Benchmark - Speed and efficiency tests
📦 Installation
Requirements
- Python 3.10 or higher
- NumPy 2.20.0+
- KeçeciNumbers 0.8.4+
Install via Pip
pip install kececinumbers==0.8.4
pip install numpy>=1.20.0
Manual Installation
# Clone repository
git clone https://github.com/WhiteSymmetry/kha256.git
cd kha256
# Install dependencies
pip install -r requirements.txt
# Install in development mode
pip install -e .
🎯 Quick Start
Basic Hashing
from kha256 import quick_hash
# Simple text hash
hash_result = quick_hash("Hello World!")
print(f"Hash: {hash_result}")
# Example: 8f3a2b1c5d7e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3f4a5
Password Hashing
from kha256 import hash_password
password = "SecretPassword123!"
hashed_password = hash_password(password)
print(f"Hashed Password: {hashed_password[:80]}...")
Command Line Usage
# Run tests
python -m kha256 --test
# Create single hash
python -m kha256 --hash "Hello World!"
# Performance test
python -m kha256 --benchmark
# Demo mode
python -m kha256 --demo
🔧 Advanced Usage
Customized Hasher
from kha256 import FortifiedKhaHash256, FortifiedConfig
# Custom configuration
config = FortifiedConfig(
iterations=20, # More iterations
shuffle_layers=16, # More mixing layers
salt_length=128, # Longer salt
double_hashing=True, # Double hashing active
enable_quantum_resistance=True # Quantum resistance
)
# Create hasher
hasher = FortifiedKhaHash256(config)
# Hash data
data = "Important secret data"
salt = secrets.token_bytes(64) # Strong salt
hash_result = hasher.hash(data, salt)
print(f"Hash: {hash_result}")
Batch Operations
from kha256 import FortifiedKhaHash256
hasher = FortifiedKhaHash256()
# Multiple data hashing
data_list = ["data1", "data2", "data3", "data4"]
hashes = [hasher.hash(data) for data in data_list]
# File hashing
def hash_file(file_path):
with open(file_path, 'rb') as f:
file_data = f.read()
return hasher.hash(file_data)
🛡️ Security Tests
Avalanche Test
from kha256 import FortifiedKhaHash256
hasher = FortifiedKhaHash256()
results = hasher.test_avalanche_effect(samples=100)
print(f"Average Bit Change: {results['avg_bit_change_percent']:.2f}%")
print(f"In Ideal Range: {results['in_ideal_range']}")
print(f"Status: {results['status']}")
# Output: EXCELLENT, GOOD, ACCEPTABLE or POOR
Collision Test
results = hasher.test_collision_resistance(samples=5000)
print(f"Collisions: {results['collisions']}")
print(f"Collision Rate: {results['collision_rate_percent']:.6f}%")
Comprehensive Test
from kha256 import run_comprehensive_test
# Run all tests
hasher = run_comprehensive_test()
📊 Performance
Benchmark Results
Size Average Time Throughput
------ ------------- ----------
64 byte ? ms ? MB/s
256 byte ? ms ? MB/s
1 KB ? ms ? MB/s
4 KB ? ms ? MB/s
16 KB ? ms ? MB/s
Performance Optimizations
from kha256 import FortifiedConfig
# Fast mode (less security, faster)
fast_config = FortifiedConfig(
iterations=8,
shuffle_layers=6,
components_per_hash=12,
enable_quantum_resistance=False,
double_hashing=False
)
# Security mode (maximum security)
secure_config = FortifiedConfig(
iterations=24,
shuffle_layers=20,
components_per_hash=32,
enable_quantum_resistance=True,
double_hashing=True,
triple_compression=True
)
📚 API Reference
Main Classes
FortifiedKhaHash256
Main hash class.
class FortifiedKhaHash256:
def __init__(self, config: Optional[FortifiedConfig] = None)
def hash(self, data: Union[str, bytes], salt: Optional[bytes] = None) -> str
def test_avalanche_effect(self, samples: int = 100) -> Dict[str, Any]
def test_collision_resistance(self, samples: int = 5000) -> Dict[str, Any]
def test_uniformity(self, samples: int = 5000) -> Dict[str, Any]
def get_stats(self) -> Dict[str, Any]
FortifiedConfig
Configuration class.
@dataclass
class FortifiedConfig:
output_bits: int = 256
hash_bytes: int = 32
iterations: int = 16
rounds: int = 8
components_per_hash: int = 20
salt_length: int = 96
shuffle_layers: int = 12
diffusion_rounds: int = 9
avalanche_boosts: int = 6
enable_quantum_resistance: bool = True
enable_post_quantum_mixing: bool = True
double_hashing: bool = True
triple_compression: bool = True
memory_hardening: bool = True
entropy_injection: bool = True
time_varying_salt: bool = True
context_sensitive_mixing: bool = True
cache_enabled: bool = False
parallel_processing: bool = False
Helper Functions
# Quick hash
quick_hash(data: Union[str, bytes]) -> str
# Password hashing
hash_password(password: str, salt: Optional[bytes] = None) -> str
# Hasher creation
generate_fortified_hasher() -> FortifiedKhaHash256
# Run tests
run_comprehensive_test() -> FortifiedKhaHash256
# Benchmark
benchmark_hash(data_sizes: List[int] = [64, 256, 1024, 4096]) -> Dict[str, Any]
Development Environment Setup
# Clone repository
git clone https://github.com/mehmetkececi/kha256.git
cd kha256
# Create virtual environment
python -m venv venv
source venv/bin/activate # Linux/Mac
# or
venv\Scripts\activate # Windows
# Install dependencies
pip install -r requirements.txt
pip install -r requirements-dev.txt # Development dependencies
# Run tests
pytest tests/
python -m kha256 --test
Code Standards
- Follow PEP 8 style guide
- Use type hints
- Write docstrings
- Add unit tests
📄 License
This project is licensed under the AGPL-3.0 License. See the LICENSE file for details.
Copyright 2025 Mehmet Keçeci
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
APA
Keçeci, M. (2025). KHA-256: A Next-Generation Cryptographic Hash Function Based on Keçeci Numbers and Mathematical Constants. Open Science Articles (OSAs), Zenodo. https://doi.org/10.5281/zenodo.18156885
Keçeci, M. (2025). KHA-256. GitHub, PyPI, Anaconda, Zenodo. https://doi.org/10.5281/zenodo.18089401 & https://github.com/WhiteSymmetry/kha256 & https://pypi.org/project/kha256 & https://anaconda.org/bilgi/kha256
Keçeci, M. (2025). Keçeci Hash Algorithm (Keçeci Hash Algoritması), KHA-256. https://github.com/WhiteSymmetry/kha256
Keçeci, M. (2025). Keçeci Hash Algorithm (Keçeci Hash Algoritması), KHA-256. https://pypi.org/project/kha256
Keçeci, M. (2025). Keçeci Hash Algorithm (Keçeci Hash Algoritması), KHA-256. https://anaconda.org/channels/bilgi/packages/kha256/overview
Keçeci, M. (2025). Keçeci Hash Algorithm (Keçeci Hash Algoritması), KHA-256. Zenodo. https://doi.org/10.5281/zenodo.18089401
---
KHA-256 v0.1.1
🚀 ÖZELLİKLER
- NIST SP 800-90B/22 uyumlu güvenlik
- Mükemmel avalanche etkisi (%90 ideal)
- Yüksek performans: 0.02ms/hash, 35+ MB/s throughput
- Etkili cache mekanizması: %100 hit rate
- Kuantum direnci ve post-kuantum karıştırma
- Çift hash ile güçlü çakışma direnci
📊 PERFORMANS
- Ortalama hash süresi: 0.02ms (cached)
- Throughput: 35,597 KB/s
- SHA-256 karşılaştırması: 25.3x daha yavaş (güvenlik özellikleri nedeniyle)
✅ TEST SONUÇLARI
- Genel Puan: 98.4/100 (EXCELLENT)
- Tüm güvenlik testleri geçildi
- Tüm fonksiyonel testler başarılı
- Tüm edge case'ler destekleniyor
🎯 KULLANIM ALANLARI
- Yüksek güvenlik gerektiren uygulamalar
- Parola hash'leme sistemleri
- Kriptografik imzalar
- Kuantum sonrası dönem için hazırlık
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file kha256-0.1.6.tar.gz.
File metadata
- Download URL: kha256-0.1.6.tar.gz
- Upload date:
- Size: 113.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e8ed56159e96e2088c5d0a33d473c4a25fac461e8b2497506f526b8ea7298409
|
|
| MD5 |
565ff11d318e6ae1a3c4e7edd42c3ec3
|
|
| BLAKE2b-256 |
a53faf4d01c2c17d56bf1a0d4a667b8e1b02e1a97b79950f264dbba79e24dfde
|
Provenance
The following attestation bundles were made for kha256-0.1.6.tar.gz:
Publisher:
workflow.yml on WhiteSymmetry/kha256
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
kha256-0.1.6.tar.gz -
Subject digest:
e8ed56159e96e2088c5d0a33d473c4a25fac461e8b2497506f526b8ea7298409 - Sigstore transparency entry: 930753322
- Sigstore integration time:
-
Permalink:
WhiteSymmetry/kha256@37650d8adc99860e7825b4df47faa96ea9a94939 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/WhiteSymmetry
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
workflow.yml@37650d8adc99860e7825b4df47faa96ea9a94939 -
Trigger Event:
push
-
Statement type:
File details
Details for the file kha256-0.1.6-py3-none-any.whl.
File metadata
- Download URL: kha256-0.1.6-py3-none-any.whl
- Upload date:
- Size: 98.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7c83b38a9aa1a976c3552b14f9ece6ab31d4a0cdc350751ca820de5387d229a0
|
|
| MD5 |
a882e0778d3646b80da28f671e888ff6
|
|
| BLAKE2b-256 |
c7d2c22627eb9748dcf2c1dc48be107bfb65a6c4a561215b608f92079382c69e
|
Provenance
The following attestation bundles were made for kha256-0.1.6-py3-none-any.whl:
Publisher:
workflow.yml on WhiteSymmetry/kha256
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
kha256-0.1.6-py3-none-any.whl -
Subject digest:
7c83b38a9aa1a976c3552b14f9ece6ab31d4a0cdc350751ca820de5387d229a0 - Sigstore transparency entry: 930753366
- Sigstore integration time:
-
Permalink:
WhiteSymmetry/kha256@37650d8adc99860e7825b4df47faa96ea9a94939 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/WhiteSymmetry
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
workflow.yml@37650d8adc99860e7825b4df47faa96ea9a94939 -
Trigger Event:
push
-
Statement type: