AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY

被引:0
|
作者
Sodhi, Gurpreet K. [1 ]
Gaba, Gurjot S. [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Commun Engn, Jalandhar 144411, India
关键词
Hash; Data integrity; Message digest; Message authentication code; Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered. A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA) is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA-384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.
引用
收藏
页码:778 / 789
页数:12
相关论文
共 50 条
  • [1] Enhanced VSDL Hash Algorithm for Data Integrity and Protection
    Karthi, G.
    Ezhilarasan, M.
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2018, VOL 2, 2019, 839 : 527 - 539
  • [2] Data integrity algorithm based on additive generators and hash function
    Vladimir Fomichev
    Dmitry Bobrovskiy
    Alisa Koreneva
    Timur Nabiev
    Dmitry Zadorozhny
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 31 - 41
  • [3] DILH: Data Integrity using Linear Combination for Hash Algorithm
    Hamamreh, Rushdi A.
    Jamoos, Mohammed A.
    Zaghal, Raid
    2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,
  • [4] Data integrity algorithm based on additive generators and hash function
    Fomichev, Vladimir
    Bobrovskiy, Dmitry
    Koreneva, Alisa
    Nabiev, Timur
    Zadorozhny, Dmitry
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (01) : 31 - 41
  • [5] An efficient hash-based algorithm for sequence data searching
    Chu, KW
    Lam, SK
    Wong, MH
    COMPUTER JOURNAL, 1998, 41 (06): : 402 - 415
  • [6] Caches and hash trees for efficient memory integrity verification
    Gassend, B
    Suh, GE
    Clarke, D
    van Dijk, M
    Devadas, S
    NINTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2003, : 295 - 306
  • [7] Implement Efficient Data Integrity for Cloud Distributed File System Using Merkle Hash Tree
    Tseng, Fan-Hsun
    Chou, Li-Der
    Chiang, Hua-Pei
    Yu, Wei-Jen
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02): : 307 - 316
  • [8] Perceptual hash algorithm for integrity authentication of remote sensing image
    Ding, Kaimeng
    Zhu, Changqing
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2014, 44 (04): : 723 - 727
  • [9] Efficient data representations that preserve information
    Tishby, N
    DISCOVERY SCIENCE, PROCEEDINGS, 2003, 2843 : 45 - 45
  • [10] Efficient data representations that preserve information
    Tishby, N
    ALGORITHMIC LEARNING THEORY, PROCEEDINGS, 2003, 2842 : 16 - 16