AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY

被引:0
|
作者
Sodhi, Gurpreet K. [1 ]
Gaba, Gurjot S. [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Commun Engn, Jalandhar 144411, India
关键词
Hash; Data integrity; Message digest; Message authentication code; Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered. A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA) is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA-384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.
引用
收藏
页码:778 / 789
页数:12
相关论文
共 50 条
  • [21] HCS: A Fast and Efficient Algorithm to Smooth Hash Collision
    Xie, Yun
    Qiao, Dengke
    Sun, Yong
    Liu, Jingang
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2738 - 2742
  • [22] EFFICIENT VIRTUAL HASH ALGORITHM FOR A SPELLING CHECKER.
    Wiener, Richard S.
    Journal of Pascal, Ada & Modula-2, 1986, 5 (01): : 23 - 29
  • [23] Efficient Retrieval on Dense Vector by Similarity Preserve Hash in Vegetable Geographical Origin Identification System
    Sato, Nobuyoshi
    Uehara, Minoru
    Shimomura, Koichiro
    Yamamoto, Hirobumi
    Kamijo, Kenichi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 227 - 235
  • [24] Remote Data Integrity Checking Protocols from Homomorphic Hash Functions
    Xu, Wei
    Feng, Dan
    Liu, Jingning
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 604 - 608
  • [25] Efficient target selection in similarity preserve hash for distributed geographical origin identification system of vegetables
    Sato, Nobuyoshi
    Uehara, Minoru
    Shimomura, Koichiro
    Yamamoto, Hirobumi
    Kamijo, Kenichi
    SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 40 - +
  • [26] A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries
    Shi, Canghong
    Li, Xiaojie
    Wang, Hongxia
    IEEE ACCESS, 2020, 8 : 22249 - 22265
  • [27] HARE: A new Hash-based Authenticated Reliable and Efficient Modified Merkle Tree Data Structure to Ensure Integrity of Data in the Healthcare Systems
    Chelladurai, Usharani
    Pandian, Seethalakshmi
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [28] A Consistent Hash Data Placement Algorithm Based on Stripe
    Wei Z.
    Dou Y.
    Gao Y.
    Ma J.
    Sun N.
    Xing J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 888 - 903
  • [29] Research on Wireless Data Encryption Based on Hash Algorithm
    Gao Hongtao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 377 - 380
  • [30] A PARALLEL HASH JOIN ALGORITHM FOR MANAGING DATA SKEW
    WOLF, JL
    YU, PS
    TUREK, J
    DIAS, DM
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 1993, 4 (12) : 1355 - 1371