AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY

被引:0
|
作者
Sodhi, Gurpreet K. [1 ]
Gaba, Gurjot S. [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Commun Engn, Jalandhar 144411, India
关键词
Hash; Data integrity; Message digest; Message authentication code; Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered. A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA) is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA-384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.
引用
收藏
页码:778 / 789
页数:12
相关论文
共 50 条
  • [31] An Efficient Broadcast Algorithm in Distribued Hash Table under Churn
    Li, Wei
    Chen, Shanzhi
    Zhou, Ping
    Li, Xin
    Li, Yuhong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1929 - +
  • [32] Secure Hash Algorithm Based on Efficient Chaotic Neural Network
    Abdoun, Nabil
    El Assad, Safwan
    Abu Taha, Mohammad
    Assaf, Rima
    Deforges, Olivier
    Khalil, Mohamad
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 405 - 410
  • [33] An Efficient Parallel Algorithm for Hash Computation in Security and Forensics Applications
    Kishore, Neha
    Kapoor, Bhanu
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 873 - 877
  • [34] An Efficient Circuit Matching Algorithm Based on Hash Extraction of Features
    He, Qin
    Li, Yingmeng
    2024 INTERNATIONAL SYMPOSIUM OF ELECTRONICS DESIGN AUTOMATION, ISEDA 2024, 2024, : 222 - 228
  • [35] An efficient routing algorithm to preserve -coverage in wireless sensor networks
    Ahmadi, Ali
    Shojafar, Mohammad
    Hajeforosh, Seyede Fatemeh
    Dehghan, Mehdi
    Singhal, Mukesh
    JOURNAL OF SUPERCOMPUTING, 2014, 68 (02): : 599 - 623
  • [36] Optimal parameter selection for efficient memory integrity verification using Merkle hash trees
    Williams, D
    Sirer, EG
    THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 383 - 388
  • [37] PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
    Wang, Junteng
    Luo, Wenjian
    Hu, Yamin
    Jiang, Hao
    2020 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2020, : 340 - 348
  • [38] A Cluster-based Protocol To Enforce Integrity and Preserve Privacy in Data Aggregation
    He, Wenbo
    Liu, Xue
    Nguyen, Hoang
    Nahrstedt, Klara
    ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, : 14 - +
  • [39] IMSet-SHA3-Tree: the Efficient Data Integrity Verification Based on SHA3 and MSet-XOR-Hash
    Feng Xiao
    Cai Luting
    Dai Zibin
    Li Wei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 460 - 467
  • [40] Data Information Security Algorithm Based on Chaos and Hash Function
    Liu, Hui
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,