DESIGN AND IMPLEMENTATION OF GEOMETRIC BASED CRYPTOGRAPHIC HASH ALGORITHM: ASH-256
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Online communication takes a major part in our daily life. Since sending or receiving information over internet is inevitable, usage of hash function is essential to check whether the information is correct or not especially for sensitive or confidential information. In this paper a new cryptographic hash function, Algorithm for Secure Hashing (ASH-256) has been proposed which is based on geometric concepts. In ASH-256, each 64-bit block of a given 512-bit block is increased to 96-bits by using Expansion table (E-Table) of DES(Data Encryption Standard) algorithm and divided into two equal sub-blocks. Each sub-block is used to generate three points of a triangle, which are involved in area calculation. The calculated area values are in turn processed to generate message digest. ASH- 256 is more secure and exhibits strong avalanche effect and also simple construction and easy to implemention, when compared to standard hash function SHA2(256).
Authors and Affiliations
Pallipamu. Venkateswara Rao
ANDROID BASED BIOMEDICAL SIGNAL MONITORING SYSTEM
Telemedicine has reduced the human effort by replacing wired infrastructure with wireless infrastructure. This paper based on body area network (BAN). sensors are attached to the human body and connected to microc...
BRANCH AND BOUND TECHNIQUE FOR SINGLE MACHINE SCHEDULING PROBLEM USING TYPE-2 TRAPEZOIDAL FUZZY NUMBERS
This paper deals branch and bound technique to solve single machine scheduling problem involving two processing times along with due date using Type-2 Trapezoidal fuzzy numbers. Our aim is to obtained optimal sequ...
Design and Implementation of Intrusion Detection System (Ids) Sensor Deployment
Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intru...
EXCLAMATORY SEARCH BASED USING WEAK IMAGES
Face detection is the procedure which can be useful to the wide range of problems like image and film processing, human computer relations, criminal recognition etc. This has annoyed researchers to develop computational...
IMPLEMENTATION OF AES ALGORITHM ON MICROBLAZE SOFT PROCESSOR
The importance of cryptography applied to security in electronic data transactions has acquired an essential relevance during the last few years. In this work, an FPGA-based implementation of the Advanced Encryption St...