AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY

被引:0
|
作者
Sodhi, Gurpreet K. [1 ]
Gaba, Gurjot S. [1 ]
机构
[1] Lovely Profess Univ, Sch Elect & Commun Engn, Jalandhar 144411, India
关键词
Hash; Data integrity; Message digest; Message authentication code; Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered. A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA) is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA-384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.
引用
收藏
页码:778 / 789
页数:12
相关论文
共 50 条
  • [41] Secure and Efficient Hash Based Finishing Algorithm for Real Random Numbers
    Yakut, Selman
    Ozer, Ahmet Bedri
    2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA PROCESSING (IDAP), 2018,
  • [42] Efficient tabling of structured data with enhanced hash-consing
    Zhou, Neng-Fa
    Have, Christian Theil
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2012, 12 : 547 - 563
  • [43] Indexed-hash algorithm for an agrometeorological data management system
    Wang, Y.B.
    Mack, T.P.
    Computers and Electronics in Agriculture, 1993, 8 (02) : 105 - 115
  • [44] Simple and efficient Hash sketching for tree-structured data
    Wu, Wei
    Jiang, Mi
    Luo, Chuan
    Li, Fangfang
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 267
  • [45] Distance Correlation between Plaintext and Hash Data by Genetic Algorithm
    Farjami, Y.
    Rahbari, D.
    Hosseini, E.
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2018, 26 (03): : 1095 - 1109
  • [46] HSWL: An Efficient Hash-based Static Wear Leveling Algorithm
    Gao, Lisen
    Fu, Yuzhuo
    Han, Xing
    Zhou, Hong
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [47] HSWL: An Efficient Hash-based Static Wear Leveling Algorithm
    Gao, Lisen
    Fu, Yuzhuo
    Han, Xing
    Zhou, Hong
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 311 - 315
  • [48] Maintaining the Integrity of Encrypted Data by Using the Improving Hash Function Based on GF (28)
    Mohammed, Sahab Dheyaa
    Rahma, Abdul Monem S.
    Hasan, Taha Mohammed
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2020, 9 (03): : 1277 - 1284
  • [49] Enhanced Anonymization Algorithm to Preserve Confidentiality of Data in Public Cloud
    Irudayasamy, Amalraj
    Lawrence, Arockiam
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2014), 2014, : 86 - 91
  • [50] Preserve Integrity in Realtime Event Summarization
    Lin, Chen
    Ouyang, Zhichao
    Wang, Xiaoli
    Li, Hui
    Huang, Zhenhua
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2021, 15 (03)