Hash Algorithm for Data Integrity based on Matrix Combination
نویسندگان
چکیده
In this paper, we propose a secure Hash Algorithm with the focus on Data Integrity. A hash function, is a function that takes some message of any length as input and transforms it into a fixed-length output called a hash value, in DILH the hash value length 1152 bits. Many types of hash functions have been defined but, the most widely used in many of the cryptographic applications currently are hash functions based on block ciphers. This algorithm based on linear combination of matrices to find noninvertible matrix, that takes advantage about of the compact representation of a set of numbers in a matrix and strong collision resistance.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملC Implementation of SHA-256 Algorithm
Hash functions play an important role in modern cryptography. Hash functions are widely used to provide services of data integrity and when they are used in combination with digital signature algorithms and MACs, they also provide authentication. In this paper a different scheme is proposed to improve the performance of the hardware implementation of the SHA-256 algorithm. The main focus of the...
متن کاملToken Based Security for Prevention of Phishing Attack at Client Side
Phishing is an electronic identity theft in which the attacker uses a combination of social engineering techniques and web spoofing techniques to decept a user into revealing sensitive information. The literature addresses this issue extensively and presents a number of solutions, which are either client based or server based. Generally client based solutions have an upper hand over the server ...
متن کاملNew Technique to Insure Data Integrity for Archival Files Storage (DIFCS)
In this paper we are developing an algorithm to increase the security of using HMAC function (Key-Hashed Message Authentication) to insure data integrity for exchanging archival files. Hash function is a very strong tool used in information security. The algorithm we are developing is safe, quick and will allow the University of Tabuk (UT) authorities to be sure that data of archival document w...
متن کاملSolving the Unconstrained Optimization Problems Using the Combination of Nonmonotone Trust Region Algorithm and Filter Technique
In this paper, we propose a new nonmonotone adaptive trust region method for solving unconstrained optimization problems that is equipped with the filter technique. In the proposed method, the various nonmonotone technique is used. Using this technique, the algorithm can advantage from nonmonotone properties and it can increase the rate of solving the problems. Also, the filter that is used in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013