Browse > Article
http://dx.doi.org/10.3745/JIPS.2012.8.1.119

An Improved Fast and Secure Hash Algorithm  

Agarwal, Siddharth (Department of Computer Science and Engineering National Institute of Technology)
Rungta, Abhinav (Department of Computer Science and Engineering National Institute of Technology)
Padmavathy, R. (Department of Computer Science and Engineering National Institute of Technology)
Shankar, Mayank (Department of Computer Science and Engineering National Institute of Technology)
Rajan, Nipun (Department of Computer Science and Engineering National Institute of Technology)
Publication Information
Journal of Information Processing Systems / v.8, no.1, 2012 , pp. 119-132 More about this Journal
Abstract
Recently, a fast and secure hash function SFHA - 256 has been proposed and claimed as more secure and as having a better performance than the SHA - 256. In this paper an improved version of SFHA - 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and improved SFHA-256. From the analysis it can be concluded that the newly proposed algorithm is more secure, efficient, and practical.
Keywords
SHA-256; SFHA-256; Improved SFHA-256;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Mitchell, D. Rush, and M. Walker, "A remark on hash functions for message authentication," Computers & Security, vol8, 1989, pp.517-524.   DOI   ScienceOn
2 M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications," Proc. 21st ACM Symposium on the Theory of Computing, 1990, pp.387-394.
3 http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
4 T. ElGamal , "A public key cryptosystem and a signature scheme based on discrete logarithms". IEEE Transaction of Information Theory, vol.31 (4), 1985, pp.469-472.   DOI
5 Accredited Standards Committee X9, American National Standard X9.62-2005, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 2005.
6 Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, 2009.
7 Hassan. M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail Abdelfatah, "A New Secure and Fast Hashing Algorithm (SFHA-256)", 25th National Radio Science Conference, 2008.
8 Dan Boneh, Matthew Franklin, "Identity-Based Encryption from the Weil Pairing", SIAM Journal of Computing, vol32(3), 2001, pp.586-615.   DOI   ScienceOn
9 D. Davies and W. L. Price, The application of digital signatures based on public key cryptosystems, NPL Report DNACS 39/80, 1980.
10 I.B. Damgard, "Collision free hash functions and public key signature schemes," Advances in Cryptology, Proc. Eurocrypt'87, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp.203-216.