Evolution of Sha-176 Algorithm

نویسندگان

  • Piyush Garg
  • Namita Tiwari
چکیده

To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified security flaws, namely that a possible mathematical weakness might exist. This point out that stronger hash function would be desirable. In this paper we are proposing a new hash function, say SHA-176 that has more strength than the existing. In this we are fulfilling basic security principle i.e. integrity. Basically this hash function is developed to improve the security. Presented results are showing the performance of the proposed SHA-176 in terms of efficiency and security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relaxed Differential Fault Analysis of SHA-3

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

متن کامل

A hybrid GA-TLBO algorithm for optimizing a capacitated three-stage supply chain network

A teaching-learning-based optimization (TLBO) algorithm is a new population-based algorithm applied in some applications in the literature successfully. Moreover, a genetic algorithm (GA) is a popular tool employed widely in many disciplines of engineering. In this paper, a hybrid GA-TLBO algorithm is proposed for the capacitated three-stage supply chain network design (SCND) problem. The SCND ...

متن کامل

مروری بر حملات مکعبی، خطای تفاضلی و ساختارهای خطی بر روی تابع کچک(SHA-3)

در سال‌های اخیر بررسی امنیت سومین تابع چکیده‌ساز امن[1] یکی از مهم‌ترین موضوعات مورد توجه پژوهش­گران حوزه رمزنگاری بوده ‌است. توابع چکیده‌ساز در رمزنگاری کاربردهای متعددی دارند. از این­رو امنیت توابع چکیده‌ساز در مقابل حملات مختلف برای سامانه‌هایی که از آن استفاده می‌کنند، بسیار مهم است. حملات و تحلیل‌های متعددی تا امروز بر روی SHA-3 اعمال شده ‌است؛ اما تاکنون هیچ­کدام موفق به شکستن آن به‌صورت ...

متن کامل

Well Placement Optimization Using Differential Evolution Algorithm

Determining the optimal location of wells with the aid of an automated search algorithm is a significant and difficult step in the reservoir development process. It is a computationally intensive task due to the large number of simulation runs required. Therefore,the key issue to such automatic optimization is development of algorithms that can find acceptable solutions with a minimum numbe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012