BHA-160: Constructional Design of Hash Function based on NP-hard Problem

Abstract

Secure hash function is used to protect the integrity of the message transferred on the unsecured network. Changes on the bits of the sender’s message are recognized by the message digest produced by the hash function. Hash function is mainly concerned with data integrity, where the data receiver needs to verify whether the message has been altered by eavesdropping by checking the hash value appended with the message. To achieve this purpose, we have to use a secure hash function that is able to calculate the hash value of any message. In this paper, we introduce an alternative hash function based on NP-hard problem. The chosen NP-hard problem is known as Braid Conjugacy problem. This problem has proved to be secure against cryptanalysis attacks.

Authors and Affiliations

Ali AlShahrani

Keywords

Related Articles

Performances Analysis of a SCADA Architecture for Industrial Processes

SCADA (Supervisory Control And Data Acquisition) systems are used to monitor and control various industrial processes, and have been continuously developed in order to incorporate the new technologies from software devel...

Improving Video Streams Summarization Using Synthetic Noisy Video Data

For monitoring public domains, surveillance camera systems are used. Reviewing and processing any subsequences from large amount of raw video streams is time and space consuming. Many efficient approaches of video summar...

Improved Discrete Differential Evolution Algorithm in Solving Quadratic Assignment Problem for best Solutions

The combinatorial optimization problems are very important in the branch of optimization or in the field of operation research in mathematics. The quadratic assignment problem (QAP) is in the category of facilities locat...

Evaluating Mobile Phones and Web Sites for Academic Information Needs

In the last decade, there has been an exponential growth in use of mobile phones among people. Smart phone invention has digitized life of a common man especially after introduction of 3G/4G technology. People are used t...

 A Reliable Security Model Irrespective of Energy Constraints in Wireless Sensor Networks

 Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It is an emerging technology that shows various applications both for public and military purpose. In order to operate th...

Download PDF file
  • EP ID EP578506
  • DOI 10.14569/IJACSA.2019.0100543
  • Views 102
  • Downloads 0

How To Cite

Ali AlShahrani (2019). BHA-160: Constructional Design of Hash Function based on NP-hard Problem. International Journal of Advanced Computer Science & Applications, 10(5), 351-355. https://europub.co.uk/articles/-A-578506