Implementation of a new 32-bit Algorithm for Password Hashing 

Abstract

The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from recent history that none of the hash algorithms are completely secure and have been broken one way or the another. The new algorithm described in this paper take some of the good features from MD5 and SHA1. It takes an input of 32-bit and produces a 64-bit hash as a result it makes the system more secure. Various techniques have been employed to induce randomness in the hash so that it makes the process more rigorous and provide fast execution on 32 bit machine. 

Authors and Affiliations

Rohan Dham , Sahhil Tanwer , Anjali Arora , Aashita Chhabra

Keywords

Related Articles

Protein-Protein Interaction Classification Using Jordan Recurrent Neural Network

Proteins form a very important part of a living cell. The biological functions are carried out by the proteins within the cell by interacting with other proteins in other cells. This is called protein-protein interaction...

HARDWARE IMPLEMENTATION OF SATELLITE IMAGE ENHANCEMENT USING DWT LIFTING SCHEME WITH SPARTAN3 FPGA KIT

Enhancement of a digital or satellite image can be done in either of the areas viz, contrast , resolution and sharpness. In this paper we are introducing the hardware implementation of image enhancement using DWT lifting...

A Comparative Review on Hierarchical based and Distance Based Leach Protocol

Wireless Networking is a tools in which numeral mobile nodes can converse with each other openly or not directly through wireless relations. A sensor network is poised of a great number of sensor nodes and a sink. In the...

A Dymamic Service Composition on Social Networks

In today’s world, web services are highly essential as they are required for accomplishing tasks in a matter of second. Web services provide features such as e-Booking, e-Shopping, e-Banking that helps users to acquire e...

Animal Health Observation by Using Query Processing Based On Fuzzy Logic in Wireless Sensor Network

Wireless Sensor Networks (WSNs) query processing based on fuzzy logic provides specifications of the desired data of common natural language, eliminate the custom of threshold values the same as predicates. The query of...

Download PDF file
  • EP ID EP100723
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

Rohan Dham, Sahhil Tanwer, Anjali Arora, Aashita Chhabra (2015). Implementation of a new 32-bit Algorithm for Password Hashing . International Journal of Computer Science & Engineering Technology, 6(6), 380-385. https://europub.co.uk/articles/-A-100723