Implementation of a new 32-bit Algorithm for Password Hashing 

Abstract

The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from recent history that none of the hash algorithms are completely secure and have been broken one way or the another. The new algorithm described in this paper take some of the good features from MD5 and SHA1. It takes an input of 32-bit and produces a 64-bit hash as a result it makes the system more secure. Various techniques have been employed to induce randomness in the hash so that it makes the process more rigorous and provide fast execution on 32 bit machine. 

Authors and Affiliations

Rohan Dham , Sahhil Tanwer , Anjali Arora , Aashita Chhabra

Keywords

Related Articles

A Modeling Tool to Minimize the Expected Waiting Time of Call Center’s Customers with Optimized Utilization of Resources

In order to deliver assured Quality of Service (QoS) to the customer in terms of minimizing the expected waiting time in the queue; the service providers are putting a lot of effort. The varying calling pattern of the cu...

Designing A Decision Support System For Weaning Using Ann – A Preliminary Study

Patients require mechanical ventilator support when the ventilatory and/or gas exchange capabilities of their own respiratory system fail. Mechanical ventilation can have life threatening complications, it should be disc...

SURVEY OF ACCIDENT SEVERITY ESTIMATION USING DATA MINING TECHNIQUES

As technology has been improved by many changes and inventions are made almost every day. Traumatic events come in many different ways at many different times of one’s life. Recent trends on the advantage of communicatio...

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the...

TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY

Sensor nodes in wireless sensor network are densely deployed to monitor the physical world. In distributed access control user can directly access data from sensor nodes. While accessing data from sensor nodes user detai...

Download PDF file
  • EP ID EP100723
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Rohan Dham, Sahhil Tanwer, Anjali Arora, Aashita Chhabra (2015). Implementation of a new 32-bit Algorithm for Password Hashing . International Journal of Computer Science & Engineering Technology, 6(6), 380-385. https://europub.co.uk/articles/-A-100723