Abstract
Hash functions used to provide integrity and authentication on messages sent over unsecure network. There are two most commonly used hash and MD algorithms: SHA-1 and MD5, which are vulnerable to collision attack. The weakness of these hash algorithms is that sometimes two different inputs will produce the same hash as output. To reduce this collision attack there is need to have a better hash algorithm so that the output in each round will be different and not to be equal with the same output in the next coming stages. In this paper, modified SHA-192 is implemented having a message digests of length 192 and we have also compared the security analysis of famous secure hash algorithm with enhanced SHA-192.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tiwari, H., Asawa, Dr.: A secure hash function MD-192 with modified message expansion. Int. J. Comput. Sci. Inf. Secur. 7(2) (2010)
Turner, S., Chen, L.: Updated security considerations for the MD5 message-digest and the HMAC-MD5 algorithms. IETF (2011)
Gupta, G., Sharma, S.: Enhanced SHA192 algorithm with larger bit difference. In: International Conference on Communication Systems and Network Technologies. IEEE (2013)
Srinivas, S., Yeligati, S.: FPGA implementation of Proposed SHA-192 algorithm for digital signature application. Int. J. Emerg. Eng. Res. Technol. 2(4) (2014)
Lakshmanan, T., Muthusamy, M.: A novel secure hash algorithm for public key digital signature schemes. Arab J. Inf. Technol. 9(3) (2012)
Garg, P., Tiwari, N.: Performance analysis of SHA algorithms (SHA-1 and SHA-192): a review. IJCTEE 2(3) (2012)
Xiao-hui, C., Jian-zhi, D.: Design of SHA-1 algorithm based on FPGA. In: IEEE Second International Conference on Networks Security, Wireless Communications and Trusted Computing, (NSWCTC), vol. 1, pp. 532–534 (2010)
Thulasmani, L., Madheswaran, M.: Security and robustness enhancement of existing Hash algorithm. In: International Conference on Signal Processing Systems. IEEE (2009)
Ming, H., Wang, Y.: The collision rate tests of two known message digest algorithms.In: International Conference on Computational Intelligence and Security, vol. 2. IEEE (2009)
Stallings, W.: Cryptography and Network Security, 4th edn. (2006)
Biham, E., Chen, R., Joux, A., Jalby,W.: Collisions of SHA-0 and reduced SHA-1. In: Advances in Cryptology. Springer, Berlin (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Harshita, Sarvesh Tanwar (2016). Implementation and Performance Analysis of Enhanced SHA-192. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_54
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_54
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)