ALGORITHMIC DESIGN AND ANALYSIS OF CRYPTOGRAPHIC SHA - 256 HASH FUNCTION WITH PROPOSED SHA - 288 HASH MODEL
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.6, No. 2)Publication Date: 2017-03-02
Authors : Pawan Kumar; Harsh Dev;
Page : 160-164
Keywords : SHA - 256/288; Merkle - Damgard construction; Digital Signature; Digital India etc.;
Abstract
Cryptography is the art of providing security to the message .It gives freedom to the user from hacking of the original message. The here are multiple techniques to provide cryptographic security to the message but this paper focus on the SHA - 256 hash func tion and its extended proposed model SHA - 288 for better security. The basic structure of maximum hash functions is based on the Merkle - Damgard construction. Most of the hash functions are used for information security purposes such as digital signature, p assword authentication; message authentication etc.The hash algorithms perform security checks over plain text by converting plain text into cipher text called message digest or checksums. The paper explains about the cryptanalysis and design of SHA - 2 Fami ly as MD5 and SHA - 1 going to be outdated after few months. The new model based on construction of SHA - 256 has also been highlight for providing strength to the security domain.
Other Latest Articles
- SAFETY MANAGEMENT AT CONSTRCTION SITE
- DEVELOPMENT OF FOUR - LEVEL MODEL SYSTEM OF SDH / SONET NETWORK MA N AGEMENT
- INVESTIGATION OF DIFFERENT MODELS OF COMBINED PARALLEL FLASH BINARY CYCLES
- IN SEARCH OF INVERSION ANALOGY CHROMOSOMES BITS AND MACHINE LEARNING
- IMPACT EXTENT OF TEACHER PROFESSIONAL DEVELOPMENT ON TEACHING MATH IN PREP - YEAR - UNIVERSITY OF HAIL
Last modified: 2017-02-11 19:46:42