Evolution of Sha-176 Algorithm

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 2

Abstract

 To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified security flaws, namely that a possible mathematical weakness might exist. This point out that stronger hash function would be desirable. In this paper we are proposing a new hash function, say SHA-176 that has more strength than the existing. In this we are fulfilling basic security principle i.e. integrity. Basically this hash function is developed to improve the security. Presented results are showing the performance of the proposed SHA-176 in terms of efficiency and security

Authors and Affiliations

Piyush Garg

Keywords

Related Articles

 Implementing Automatic Callback Using Session Initiation Protocol

 TheSession Initiation Protocol (SIP), is an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. SIP is developed by SIP working  gr...

 An Effective Solution to Adequate and Operative Duplicate Detection in Stratified Data

 Abstract: Data Mining is considered as a nontrival extraction of implicit, previously unknown and potentially usefull information from data. Although there is a long line of work on identifying duplicates in relati...

 Pre-Processing Method for Extraction of Pectoral Muscle and Removal of Artefacts in Mammogram

 Abstract: Mammography is an effective imaging modality used by radiologists for detection of breast cancer and effective suppression of pectoral muscle as well as removal of noise in form of artefacts aids accurate...

 Virtual Energy Based Encryption & Keying on Wireless Sensor Network

 : Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we introdu...

 Energy-Balanced Dispatch of Mobile Sensors in Hybrid Wireless Sensor Network with Obstacles

We consider a hybrid wireless sensor network with static and mobile nodes. Static sensors monitor the environment and report events occurring in the sensing field. Mobile sensors are then dispatched to visit these even...

Download PDF file
  • EP ID EP98615
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Piyush Garg (2012).  Evolution of Sha-176 Algorithm. IOSR Journals (IOSR Journal of Computer Engineering), 2(2), 18-22. https://europub.co.uk/articles/-A-98615