Dr. CHETHAN CHANDRA S BASAVARADDI
Sign up for access to the world's latest research
Abstract
DSA_Hashing_Class 4
Related papers
Int. J. Sci. Res. in Computer Science and Engineering, 2022
The world is in front of a huge digital revolution. Pragmatically 59% people of the world population are now using the internet for their daily activities related to business, medical, industries, education. It's a very big challenge to maintain the integrity of the shared data. Those issues can be solved by using a cryptographic technique called hashing. This paper demonstrates a new smooth cryptographic hashing algorithm based on Merkle-Damgård construction structure and Matyas-Meyer-Oseas compression function which generates hashes through 16 rounds where each block contains 256 bits of data. These blocks of data are processed through some existing and newly developed methods like bit scheduler, switching box, shift in column, shift in row, and bit mixing. This proposed algorithm works block-wise and can generate same level of hashes as SHA-512 and MD5. But it uses less time and resources than SHA-512 and MD5 for processing alphabet and numeric data.
2011
This is the version 02 of the supporting documentation that describes in details the cryptographic hash function EDON-R which was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST), according to the public call [1]. The difference between version 01 and version 02 of the documentation is in the produced test vectors for HMAC. That is due to the fact that there was mismatch between rotation values defined in the documentation and implemented C code. Accordingly, C source code (in the accompanied CD) has been changed with the correct rotation values. So, in this documentation we do not change anything in the originally submitted algorithm, but just give the correct HMAC test values. In this version a minor change in the performance has been measured with Microsoft Visual Studio 2005, but we add new measurements performed by Intel C++ v 11.0.066 (that are slightly better than those obtained by Microsoft Visual Studio 2...
2010
Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL. In this paper we propose a new efficient hash algorithm that provides a near random hash output and overcomes some of the earlier weaknesses. Extensive simulations and comparisons with some existing hash functions have been done to prove the effectiveness of the BSA, which is an acronym for the name of the 3 authors.
The paper gives the guideline to choose a best suitable hashing method hash function for a particular problem. After studying the various problem we find some criteria has been found to predict the best hash method and hash function for that problem. We present six suitable various classes of hash functions in which most of the problems can find their solution. Paper discusses about hashing and its various components which are involved in hashing and states the need of using hashing for faster data retrieval. Hashing methods were used in many different applications of computer science discipline. These applications are spread from spell checker, database management applications, symbol tables generated by loaders, assembler, and compilers. There are various forms of hashing that are used in different problems of hashing like Dynamic hashing, Cryptographic hashing, Geometric hashing, Robust hashing, Bloom hash, String hashing. At the end we conclude which type of hash function is suitable for which kind of problem.
Lecture Notes in Computer Science, 1993
Since the data is present in digital form, security is a major assert and aspect that need to be considered in present activities. However, several incidents show us how security has compromised leading to theft/loss of data like credit card numbers and passwords. Having profound knowledge about passwords alone doesn't make strong security. Saving the pass-phrase on the server matters a lot. If this fails, leads to failure of entire system. This paper introduces a new hashing algorithm which uses levels of hierarchy and turns strong when it is used along with other hashing algorithms.
IJCSMC, 2019
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature also uses the hash algorithm. Hash function used for key generation in Symmetric and Asymmetric Key Cryptosystems. Different algorithms provide different level of security depending on how difficult is to break them. The most well-known hash algorithms are SHA-1, SHA-2, SHA-3, MD4, MD5 and Whirlpool etc. This paper discusses importance of hash functions, description about various well known hash functions, and comparative analysis of various hash algorithms.
Message Integrity and authenticity are the primary aim with the ever increasing network protocols' speed. Cryptographic Hash Functions are main building block of message integrity. Many types of hash functions are being used and developed. In this paper, we propose and describe a new keyed hash function. This newly designed function produces a hash code of 128 bits for an arbitrary length input. The function also uses a key during hashing, so any intruder that does not know key, cannot forge the hash code, and, thus it fulfills the purpose of security, authentication and integrity for a message in network. The paper discusses the algorithm for the function design, its security aspects and implementation details.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.