Data Integrity Mechanism Using Hashing Verification

被引:0
|
作者
Hamamreh, Rushdi A. [1 ]
Jamoos, Mohammed A. [2 ]
机构
[1] Al Quds Univ, Fac Engn, Comp Engn Dept, Jerusalem, Israel
[2] Al Quds Univ, Fac Sci & Technol, Comp Sci Dept, Jerusalem, Israel
关键词
computational complexity; cryptography; hashing; collision; one-way algorithm; DILH; non-invertable matrix;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values[1]. DILH algorithm using linear combination of matrices to find non-invertible matrix, that takes advantage about of the compact representation of a set of numbers in a matrix, and fast calculations.
引用
收藏
页码:94 / 98
页数:5
相关论文
共 50 条
  • [1] A New Data Integrity Verification Mechanism for SaaS
    Shi, Yuliang
    Zhang, Kun
    Li, Qingzhong
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 236 - 243
  • [2] Oblivious hashing: A stealthy software integrity verification primitive
    Chen, YQ
    Venkatesan, R
    Cary, M
    Pang, RM
    Sinha, S
    Jakubowski, MH
    [J]. INFORMATION HIDING, 2003, 2578 : 400 - 414
  • [3] Hashing and data integrity: Reliability of hashing and granularity size reduction
    Malinowski, Christopher
    Noble, Richard
    [J]. DIGITAL INVESTIGATION, 2007, 4 (02) : 98 - 104
  • [4] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
    Hambouz, Ahmed
    Shaheen, Yousef
    Manna, Abdelrahman
    Al-Fayoumi, Mustafa
    Tedmori, Sara
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
  • [5] Scalable multimedia-content integrity verification with robust hashing
    Ababneh, Sufyan
    Ansari, Rashid
    Khokhar, Ashfaq
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2008, : 263 - 266
  • [6] Data Integrity Verification in Hybrid Cloud Using TTPA
    Subha, T.
    Jayashri, S.
    [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 149 - 159
  • [7] Verification-based data integrity mechanism in smart grid network
    Dari, El Yazid
    Bendahmane, Ahmed
    Essaaidi, Mohamed
    [J]. International Journal of Security and Networks, 2021, 16 (01) : 1 - 11
  • [8] Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator
    Ren, Yongjun
    Qi, Jian
    Liu, Yepeng
    Wang, Jin
    Kim, Gwang-Jun
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (01)
  • [9] Integrity verification for XML data
    Baweu, Jules R. Nya
    Guo, Huiping
    [J]. WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2007, : 633 - 638
  • [10] Verification Control Algorithm of Data Integrity Verification in Remote Data sharing
    Xu, Guangwei
    Li, Shan
    Lai, Miaolin
    Gan, Yanglan
    Feng, Xiangyang
    Huang, Qiubo
    Li, Li
    Li, Wei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (02): : 565 - 586