DESIGN AND IMPLEMENTATION OF GEOMETRIC BASED CRYPTOGRAPHIC HASH ALGORITHM: ASH-256
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Online communication takes a major part in our daily life. Since sending or receiving information over internet is inevitable, usage of hash function is essential to check whether the information is correct or not especially for sensitive or confidential information. In this paper a new cryptographic hash function, Algorithm for Secure Hashing (ASH-256) has been proposed which is based on geometric concepts. In ASH-256, each 64-bit block of a given 512-bit block is increased to 96-bits by using Expansion table (E-Table) of DES(Data Encryption Standard) algorithm and divided into two equal sub-blocks. Each sub-block is used to generate three points of a triangle, which are involved in area calculation. The calculated area values are in turn processed to generate message digest. ASH- 256 is more secure and exhibits strong avalanche effect and also simple construction and easy to implemention, when compared to standard hash function SHA2(256).
Authors and Affiliations
Pallipamu. Venkateswara Rao
Mechanism of Automation in Vehicles
India is the world’s largest market for automobiles. Newer models with improved fuel efficiency and power ratings keep hitting the market off and on. Sadly, the security aspects of automobiles remains neglected. T...
A SEMI-DISTRIBUTED HYDROLOGICAL MODEL IN HUMID TROPICAL CLIMATE USING MALAYSIA SOIL DATA
The idea of watershed modeling is implanted in the interrelationships of geospatial and hydro-meteorological data and represented through mathematical abstractions. The behaviour of each process is controlled by i...
OPTIMIZATION OF SURFACE GRINDING PROCESS PARAMETERS FOR AISI D2 STEEL
In grinding process, Surface quality and metal removal rate are the two important performance characteristics to be consider. In this paper, Taguchi L9 orthogonal array optimization method has been used to determ...
A NEW HOMOTOPY PERTURBATION METHOD FOR SOLVING POISSON EQUATION
In this paper, we applies a new homotopy perturbation method (NHPM),to find the exact solution of Poisson equation with Dirichelet and Neumann boundary conditions, to illustrate the ability and reliability of the method...
Study on Causes and Issues of Big-Data
An increasing amount of data is becoming available on the internet. Each and every one of us is constantly producing and releasing data about ourselves. We do this either by moving around passively - our behavior...