Implementation and Performance Analysis of Enhanced SHA-192

Harshita, S Tanwar - Proceedings of the International Conference on …, 2016 - Springer
Hash functions used to provide integrity and authentication on messages sent over
unsecure network. There are two most commonly used hash and MD algorithms: SHA-1 and …

[PDF][PDF] Design of New Hash Algorithm with Integration of Key Based on the Review of Standard Hash Algorithms

N Garg, N Wadhwa - International Journal of Computer Applications, 2014 - Citeseer
ABSTRACT Cryptographic Hash Functions are main building block of message integrity.
These functions have many information security applications such as Digital Signatures …

Enhanced SHA-192 algorithm with larger bit difference

G Gupta, S Sharma - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
This paper attempts to develop a stronger and safer cryptographic algorithm which would
not only be secure, but also reduces total time taken in providing integrity of information …

[PDF][PDF] Implementation of new modified MD5-512 bit algorithm for cryptography

P Walia, V Thapar - International Journal of Innovative Research in …, 2014 - academia.edu
In the past few years, there have been significant research advances in the analysis of hash
functions and it was shown that none of the hash algorithm is secure enough for critical …

Enhancing MD5 hash algorithm using symmetric key encryption

A Shakya, N Karna - Proceedings of the 3rd International Conference on …, 2019 - dl.acm.org
Message integrity and authenticity is crucial with ever increasing network communication.
Cryptographic Hash Functions are main building block of message integrity. Many types of …

[PDF][PDF] Comparison of hash function algorithms against attacks: A review

A Maetouq, SM Daud, NA Ahmad… - International …, 2018 - pdfs.semanticscholar.org
Hash functions are considered key components of nearly all cryptographic protocols, as well
as of many security applications such as message authentication codes, data integrity …

[PDF][PDF] An Enhanced Message Digest Hash Algorithm for Information Security

A Rawat, D Agrawal - 2015 - paperpublications.org
Information is an important commodity in the world of Electronic communication. To achieve
a secure communication between communicating parties, the protection of authenticity and …

A new hash function based on combination of existing digest algorithms

H Mirvaziri, K Jumari, M Ismail… - 2007 5th Student …, 2007 - ieeexplore.ieee.org
Hash functions were introduced in cryptology as a tool to protect the authenticity of
information. SHA-1, MD5, and RIPEMD are among the most commonly-used hash function …

[PDF][PDF] Message Authentication Using New Hash Function

HS Abdulah, MAH Al-Rawi, DN Hammod - Al-Nahrain Journal of Science, 2016 - iasj.net
In cryptography, hash functions have very important effects when it's used in the message
integrity, digital time stamping, and digital signature. Hash functions compute hash value by …

Enhancing the security level of SHA-1 by replacing the MD paradigm

H Tiwari, K Asawa - Journal of computing and information technology, 2013 - hrcak.srce.hr
Sažetak Cryptographic hash functions are important cryptographic techniques and are used
widely in many cryptographic applications and protocols. All the MD4 design based hash …