Evolution of Sha-176 Algorithm

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 2

Abstract

 To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified security flaws, namely that a possible mathematical weakness might exist. This point out that stronger hash function would be desirable. In this paper we are proposing a new hash function, say SHA-176 that has more strength than the existing. In this we are fulfilling basic security principle i.e. integrity. Basically this hash function is developed to improve the security. Presented results are showing the performance of the proposed SHA-176 in terms of efficiency and security

Authors and Affiliations

Piyush Garg

Keywords

Related Articles

 Cataloging Of Sessions in Genuine Traffic by Packet Size  Distribution and Session Grouping

 Cataloging traffic keen on precise network applications is vital for application-aware network organization and it turn into more taxing because modern applications incomprehensible their network behaviors. Whe...

 A Survey and Study of Image Compression Methods

 Abstract: This paper focuses on the area of Image Compression which is used in various Image Processing Applications. This paper presents a survey and study of various image compression techniques primarily, The Pr...

 Implementation of Web Based Manufacturing Process Planning Workflow in a Pressure Die Casting Industry

 Abstract : Today’s manufacturing industry requires product data management system (PDM) for efficient product development and production. Manufacturing industries must deal with competition, time to market, reducti...

Mining High Utility Itemsets from its Concise and Lossless Representations

Abstract: Mining high utility items from databases using the utility of items is an emerging technology.Recent algorithms have a drawback in the performance level considering memory and time.Novel strategy proposed here...

 A Review of Optical Character Recognition System forRecognition of Printed Text

 Abstract: As we move ahead in technology advancements, from simple data processing, to intelligentcomputing, one area of research undergoing advancement, is the system of reading text characters on an image.Optical...

Download PDF file
  • EP ID EP98615
  • DOI -
  • Views 133
  • Downloads 0

How To Cite

Piyush Garg (2012).  Evolution of Sha-176 Algorithm. IOSR Journals (IOSR Journal of Computer Engineering), 2(2), 18-22. https://europub.co.uk/articles/-A-98615