A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Journal: The International Arab Journal of Information Technology (Vol.9, No. 3)Publication Date: 2012-05-01
Authors : Thulasimani Lakshmanan; Madheswaran Muthusamy;
Page : 262-267
Keywords : Data integrity; hash algorithm; digital signature; pre-image; message digest; and message authentication.;
Abstract
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new secure hash algorithm called SHA-192. It uses a famous secure hash algorithm given by the National Institute of standard and technology (NIST).The basic design of SHA-192 is to have the output length of 192.The SHA-192 has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. The security analysis of theSHA-192 is compared to the old one given by NIST and gives more security and excellent results as shown in our discussion. In this paper the digital signature algorithm which is given by NIST has been modified using the proposed algorithms SHA-192. Using proposed SHA-192hash algorithm a new digital signature schemes is also proposed. The SHA-192 can be used in many applications such s public key cryptosystem, digital signcryption, message authentication code, random generator and in security architecture of upcoming wireless devices like Software defined radio etc.
Other Latest Articles
- Facile Programming
- A Hybrid Approach for Urdu Sentence Boundary Disambiguation
- Comparison of Genetic Algorithm and Quantum Genetic Algorithm
- Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems
- A Novel Radon-Wavelet-based Multi-Carrier Code Division Multiple Access Transceiver Design and Simulation under Different Channel Conditions
Last modified: 2019-05-06 20:59:19