DESIGN AND IMPLEMENTATION OF GEOMETRIC BASED CRYPTOGRAPHIC HASH ALGORITHM: ASH-256

Abstract

Online communication takes a major part in our daily life. Since sending or receiving information over internet is inevitable, usage of hash function is essential to check whether the information is correct or not especially for sensitive or confidential information. In this paper a new cryptographic hash function, Algorithm for Secure Hashing (ASH-256) has been proposed which is based on geometric concepts. In ASH-256, each 64-bit block of a given 512-bit block is increased to 96-bits by using Expansion table (E-Table) of DES(Data Encryption Standard) algorithm and divided into two equal sub-blocks. Each sub-block is used to generate three points of a triangle, which are involved in area calculation. The calculated area values are in turn processed to generate message digest. ASH- 256 is more secure and exhibits strong avalanche effect and also simple construction and easy to implemention, when compared to standard hash function SHA2(256).

Authors and Affiliations

Pallipamu. Venkateswara Rao

Keywords

Related Articles

 RFID Technology and its Application Areas: A Review Paper

 Radio frequency identification is a contactless technique that uses the radio waves to identify the object uniquely. RFID Tag and Reader are major two parts of the RFID System. Tags are used to store the informati...

PLANT DISEASE DETECTION

Our India is second largest populated country in the world and most of people are farmers,but farmers are not so much educated so they do not have idea about the different diseases of plants. This is the main drawback o...

A SECURE WAY OF LOGIN WITH PERSUASIV E CUED CLICK POINTS AND PASSFACES

Text passwords are the most prevalent user authentication method, but have security and usability problems. Replacements such as biometric systems and tokens have their own drawbacks. Graphical passwor...

 A COLLABORATIVE WATCHDOG AND CLASSIFIER BASED SCHEME TO DETECT AND AVOID SELFISH NODES IN MANET

 Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes are free to move. A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile dev...

 Quality of Service Analysis in Wireless Sensor Networks for Peer to Peer Topology

 IEEE 802.15.4 is the emerging next generation standard designed for low-rate wireless personal area networks (LR-WPAN). The popularity of Wireless Sensor Networks (WSN) have increased tremendously in recent time...

Download PDF file
  • EP ID EP107073
  • DOI 10.5281/zenodo.56973
  • Views 123
  • Downloads 0

How To Cite

Pallipamu. Venkateswara Rao (30). DESIGN AND IMPLEMENTATION OF GEOMETRIC BASED CRYPTOGRAPHIC HASH ALGORITHM: ASH-256. International Journal of Engineering Sciences & Research Technology, 5(7), 275-291. https://europub.co.uk./articles/-A-107073