AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor's University
2018-03-01
|
Series: | Journal of Engineering Science and Technology |
Subjects: | |
Online Access: | http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdf |
id |
doaj-7d50a5e2bbb44af58477eea2f1a53663 |
---|---|
record_format |
Article |
spelling |
doaj-7d50a5e2bbb44af58477eea2f1a536632020-11-25T02:09:37ZengTaylor's UniversityJournal of Engineering Science and Technology1823-46902018-03-01133778789AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITYGURPREET K. SODHI0GURJOT S. GABA1School of Electronics & Communication Engineering, Lovely Professional University, Jalandhar, India - 144411School of Electronics & Communication Engineering, Lovely Professional University, Jalandhar, India - 144411Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA)is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdfHashData integrityMessage digestMessage authentication codeSecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
GURPREET K. SODHI GURJOT S. GABA |
spellingShingle |
GURPREET K. SODHI GURJOT S. GABA AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY Journal of Engineering Science and Technology Hash Data integrity Message digest Message authentication code Security |
author_facet |
GURPREET K. SODHI GURJOT S. GABA |
author_sort |
GURPREET K. SODHI |
title |
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY |
title_short |
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY |
title_full |
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY |
title_fullStr |
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY |
title_full_unstemmed |
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY |
title_sort |
efficient hash algorithm to preserve data integrity |
publisher |
Taylor's University |
series |
Journal of Engineering Science and Technology |
issn |
1823-4690 |
publishDate |
2018-03-01 |
description |
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA)is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA384 and SHA-512. The comparison is done on the basis of NIST statistical test
suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments. |
topic |
Hash Data integrity Message digest Message authentication code Security |
url |
http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdf |
work_keys_str_mv |
AT gurpreetksodhi anefficienthashalgorithmtopreservedataintegrity AT gurjotsgaba anefficienthashalgorithmtopreservedataintegrity AT gurpreetksodhi efficienthashalgorithmtopreservedataintegrity AT gurjotsgaba efficienthashalgorithmtopreservedataintegrity |
_version_ |
1724922599220183040 |