An Improved Fast and Secure Hash Algorithm

被引:6
|
作者
Agarwal, Siddharth [1 ]
Rungta, Abhinav [1 ]
Padmavathy, R. [1 ]
Shankar, Mayank [1 ]
Rajan, Nipun [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Warangal, Andhra Pradesh, India
来源
关键词
SHA-256; SFHA-256; Improved SFHA-256;
D O I
10.3745/JIPS.2012.8.1.119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a fast and secure hash function SFHA-256 has been proposed and claimed as more secure and as having a better performance than the SHA-256. In this paper an improved version of SFHA-256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and improved SFHA-256. From the analysis it can be concluded that the newly proposed algorithm is more secure, efficient, and practical.
引用
收藏
页码:119 / 132
页数:14
相关论文
共 50 条
  • [1] SHA - THE SECURE HASH ALGORITHM
    STALLINGS, W
    [J]. DR DOBBS JOURNAL, 1994, 19 (04): : 32 - &
  • [2] Towards secure and fast hash functions
    Satoh, T
    Haga, M
    Kurosawa, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 55 - 62
  • [3] TWISTER - A Framework for Secure and Fast Hash Functions
    Fleischmann, Ewan
    Forler, Christian
    Gorski, Michael
    Lucks, Stefan
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 257 - +
  • [4] A reconfigurable implementation of the new secure hash algorithm
    Zeghid, M.
    Bouallegue, B.
    Baganne, A.
    Machhout, M.
    Tourki, R.
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 281 - +
  • [5] Secure Hash Algorithm SHA-3
    Dirk Fox
    [J]. Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
  • [6] Summarizing data for secure transaction: A hash algorithm
    Basar, Mehmet Sinan
    [J]. AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 2011, 5 (34): : 13211 - 13216
  • [7] A Fast and Secure One-Way Hash Function
    El Bakrawy, Lamiaa M.
    Ghali, Neveen I.
    Hassanien, Aboul Ella
    Kim, Tai-Hoon
    [J]. SECURITY TECHNOLOGY, 2011, 259 : 85 - +
  • [8] EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY
    Khan, Burhan Ul Islam
    Olanrewaju, Rashidah Funke
    Morshidi, Malik Arman
    Mir, Roohie Naaz
    Kiah, Miss Laiha Binti Mat
    Khan, Abdul Mobeen
    [J]. MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2022, 35 (03) : 179 - 200
  • [9] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [10] Secure Hash Algorithm-2 formed on DNA
    Dieaa I. Nassr
    [J]. Journal of the Egyptian Mathematical Society, 27 (1)