ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Journal: The International Arab Journal of Information Technology (Vol.9, No. 3)

Publication Date:

Authors : ; ;

Page : 262-267

Keywords : Data integrity; hash algorithm; digital signature; pre-image; message digest; and message authentication.;

Source : Downloadexternal Find it from : Google Scholarexternal


Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new secure hash algorithm called SHA-192. It uses a famous secure hash algorithm given by the National Institute of standard and technology (NIST).The basic design of SHA-192 is to have the output length of 192.The SHA-192 has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. The security analysis of theSHA-192 is compared to the old one given by NIST and gives more security and excellent results as shown in our discussion. In this paper the digital signature algorithm which is given by NIST has been modified using the proposed algorithms SHA-192. Using proposed SHA-192hash algorithm a new digital signature schemes is also proposed. The SHA-192 can be used in many applications such s public key cryptosystem, digital signcryption, message authentication code, random generator and in security architecture of upcoming wireless devices like Software defined radio etc.

Last modified: 2019-05-06 20:59:19