AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY

Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over...

Full description

Bibliographic Details
Main Authors: GURPREET K. SODHI, GURJOT S. GABA
Format: Article
Language:English
Published: Taylor's University 2018-03-01
Series:Journal of Engineering Science and Technology
Subjects:
Online Access:http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdf
id doaj-7d50a5e2bbb44af58477eea2f1a53663
record_format Article
spelling doaj-7d50a5e2bbb44af58477eea2f1a536632020-11-25T02:09:37ZengTaylor's UniversityJournal of Engineering Science and Technology1823-46902018-03-01133778789AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITYGURPREET K. SODHI0GURJOT S. GABA1School of Electronics & Communication Engineering, Lovely Professional University, Jalandhar, India - 144411School of Electronics & Communication Engineering, Lovely Professional University, Jalandhar, India - 144411Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA)is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdfHashData integrityMessage digestMessage authentication codeSecurity
collection DOAJ
language English
format Article
sources DOAJ
author GURPREET K. SODHI
GURJOT S. GABA
spellingShingle GURPREET K. SODHI
GURJOT S. GABA
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
Journal of Engineering Science and Technology
Hash
Data integrity
Message digest
Message authentication code
Security
author_facet GURPREET K. SODHI
GURJOT S. GABA
author_sort GURPREET K. SODHI
title AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
title_short AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
title_full AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
title_fullStr AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
title_full_unstemmed AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
title_sort efficient hash algorithm to preserve data integrity
publisher Taylor's University
series Journal of Engineering Science and Technology
issn 1823-4690
publishDate 2018-03-01
description Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over these factors can lead to a huge and immutable loss. In this paper, a novel and Efficient Hash Algorithm(EHA)is presented which inherits the basic architecture of SHA-160. The performance of the proposed algorithm is evaluated by comparing it with the existing techniques which include MD2, MD5, SHA-160, SHA-256, SHA384 and SHA-512. The comparison is done on the basis of NIST statistical test suite for random numbers and avalanche criteria. The results reveal that the suggested technique is more efficient in terms of randomness and throughput, thus, it can be efficiently used in any data sensitive environments.
topic Hash
Data integrity
Message digest
Message authentication code
Security
url http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdf
work_keys_str_mv AT gurpreetksodhi anefficienthashalgorithmtopreservedataintegrity
AT gurjotsgaba anefficienthashalgorithmtopreservedataintegrity
AT gurpreetksodhi efficienthashalgorithmtopreservedataintegrity
AT gurjotsgaba efficienthashalgorithmtopreservedataintegrity
_version_ 1724922599220183040