Secure and Efficient Integrity Algorithm based on Existing SHA Algorithms

نویسندگان

  • Snigdha Soni
  • Sandeep Pratap Singh
  • Sanjay Sharma
  • Harshvardhan Tiwari
  • Marc Stevens
  • X. Wang
  • H. Yu
  • Y. L. Yin
  • Florent Chabaud
  • Antoine Joux
  • Ricardo Chaves
  • Georgi Kuzmanov
  • Leonel Sousa
چکیده

In today's world every person relies on internet for various purposes. There is always a need to take appropriate measures for getting secure communication all the way throughout this unsecure internet. Integrity is one of the most significant factors in the communication scenario. There are various algorithms that ensure the integrity but almost all are either not secure or not efficient. This paper highlights some of such algorithms and also introduces an integrity algorithm and also proves its efficiency with its implementation result.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions

The utilization of hash functions and Keyed-Hash Message Authentication Codes (HMAC) are of utmost importance to ensure data integrity and data origin authentication in digital communications. Until recently, protocols used in the Internet, such as the Internet Key Exchange (IKE), Internet Protocol Security (IPSec) and Transport Layer Security (TLS), employed HMAC in conjunction with MD5 and SH...

متن کامل

Optimized Security Algorithm for IEC 61850 based Power Utility System

As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, whi...

متن کامل

Cayley Hashes: A Class of Efficient Graph-based Hash Functions

Hash functions are widely used in cryptography. Recent breakthroughs against the standard SHA-1 prompted NIST to launch a competition for a new secure hash algorithm, SHA-3 [1]. Provably secure hash functions, that is functions whose security reduces to a simply-stated, supposedly hard mathematical problem, are widely believed to be much too slow for the NIST competition. In this paper, we disc...

متن کامل

A New Model for Sha-1 and Md5 Algorithm

Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms are widely used hash functions in IF'Sec and SSL for checking the data integrity. In this paper, we propose a hardware architecture for the standard HMAC function that supports both. Our HMAC design automatically generates the padding words and reuses the key for conse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015