Evolution of Sha-176 Algorithm

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 2, Issue 2

Abstract

 To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified security flaws, namely that a possible mathematical weakness might exist. This point out that stronger hash function would be desirable. In this paper we are proposing a new hash function, say SHA-176 that has more strength than the existing. In this we are fulfilling basic security principle i.e. integrity. Basically this hash function is developed to improve the security. Presented results are showing the performance of the proposed SHA-176 in terms of efficiency and security

Authors and Affiliations

Piyush Garg

Keywords

Related Articles

 Enhanced cAntMinerPB Algorithm for Induction of Classification Rules using Ant Colony Approach

 Abstract : Mining classification rules from data is a key mission of data mining and is getting great attention in recent years. Rule induction is a method used in data mining where the desired output is a set of R...

Sentiment analysis for improving healthcare system for women

Abstract: The system proposes a feedback mechanism wherein, sentiment analysis is performed from surveys and tweets based on prevailing health issues among adult women in India and the social opinion on prevalenthealth i...

An Improved Simulation Model for Rayleigh Fading Channels

Abstract:the model of propagation of electromagnetic energy from transmitter to receiver will be largely by way of scatting, either by reflection from the flat sides of buildings or by diffraction around such buildings o...

Improved Product Ranking For Recommendation Systems

Abstract: In the new area of information technology, the most important and recognition machine learning technique is Recommender engine. Vast numbers of knowledge discovery techniques are applied by recommender system t...

Soft Phone Support Voice and Video Calling Using Sip And Rtp Protocol

Soft Phone is a VoIP soft phone that uses the Session Initiation Protocol. It is a powerful and unique SIP software telephone that lets users make phone and video calls using single software application using any Voice o...

Download PDF file
  • EP ID EP98615
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

Piyush Garg (2012).  Evolution of Sha-176 Algorithm. IOSR Journals (IOSR Journal of Computer Engineering), 2(2), 18-22. https://europub.co.uk./articles/-A-98615