Robustness and security enhancement of SHA with modified message digest and larger bit difference

Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less time complexity as well as security of data, security is the big issue during transmission of data. Data integrity is one of the major parameter to ensure the security. There are many algorithms or methods have been developed for maintain the integrity of data during transmission. Numbers of algorithms have been proposed to provide integrity but almost all of them proved to be breakable or less secure in terms of execution time and bit difference. So to increase the security a novel SHA is introduced, that possess less execution time and better bit difference value.

[1]  Antoine Joux,et al.  Collisions of SHA-0 and Reduced SHA-1 , 2005, EUROCRYPT.

[2]  Saurabh Jain,et al.  Detection of Javascript Vulnerability At Client Agent , 2012 .

[3]  Antoine Joux,et al.  Differential Collisions in SHA-0 , 1998, CRYPTO.

[4]  Stamatis Vassiliadis,et al.  Cost-Efficient SHA Hardware Accelerators , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[5]  Richa Purohit,et al.  A Survey on Recent Cryptographic Hash Function Designs , 2013 .

[6]  Shari Lawrence Pfleeger,et al.  Security in Computing, 4th Edition , 2006 .

[7]  S. Sharma,et al.  Enhanced SHA-192 Algorithm with Larger Bit Difference , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[8]  M. Madheswaran,et al.  Security and Robustness Enhancement of Existing Hash Algorithm , 2009, 2009 International Conference on Signal Processing Systems.

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  G. Geetha,et al.  Cryptographic Hash Functions: A Review , 2012 .

[11]  Krishna Asawa,et al.  A Secure Hash Function MD-192 With Modified Message Expansion , 2010, ArXiv.

[12]  Rachana Mishra,et al.  Automated Process of Server and Client Environment with Attack Alert Based on DES , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[13]  A. Senthilkumar,et al.  Theoretical Survey on Secure Hash Functions and issues , 2013 .