BHA-160: Constructional Design of Hash Function based on NP-hard Problem
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
Secure hash function is used to protect the integrity of the message transferred on the unsecured network. Changes on the bits of the sender’s message are recognized by the message digest produced by the hash function. Hash function is mainly concerned with data integrity, where the data receiver needs to verify whether the message has been altered by eavesdropping by checking the hash value appended with the message. To achieve this purpose, we have to use a secure hash function that is able to calculate the hash value of any message. In this paper, we introduce an alternative hash function based on NP-hard problem. The chosen NP-hard problem is known as Braid Conjugacy problem. This problem has proved to be secure against cryptanalysis attacks.
Authors and Affiliations
Ali AlShahrani
Feature Subsumption for Sentiment Classification of Dynamic Data in Social Networks using SCDDF
The analysis of opinions till now is done mostly on static data rather than on the dynamic data. Opinions may vary in time. Earlier methods concentrated on opinions expressed in an individual site. But on a given concept...
Smart Tourism Architectural Model (Kingdom of Saudi Arabia: A Case Study)
The researchers have proposed and implemented a general application architecture model that complies with the demands of the Saudi tourism sector to be used by tourists on their mobile devices. The design architecture ai...
Secure Deletion of Data from SSD
The deletion of data from storage is an important component on data security. The deletion of entire disc or special files is well-known on hard drives, but this is quite different on SSDs, because they have a different...
Empirical Assessment of Ensemble based Approaches to Classify Imbalanced Data in Binary Classification
Classifying imbalanced data with traditional classifiers is a huge challenge now-a-days. Imbalance data is a situation wherein the ratio of data within classes is not same. Many real life situations deal with such proble...
Partial Greedy Algorithm to Extract a Minimum Phonetically-and-Prosodically Rich Sentence Set
A phonetically-and-prosodically rich sentence set is so important in collecting a read-speech corpus for developing phoneme-based speech recognition. The sentence set is usually searched from a huge text corpus of millio...