Downloads: 126 | Views: 230
Research Paper | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019 | Popularity: 6.2 / 10
Enhancing Security and Speed of Sha-192 with Higher Avalanche
Sushama Ingale, Arun Jhapate
Abstract: In todays world, security is the main issue over internet during transmission of data. Integrity is one of the main factors to guarantee the protection over data. There are many hash algorithms which ensure the integrity. Secure Hash Algorithm can be a capable hashing technique. SHA-3 is the most up to date and efficient Secure Hash Algorithm. In this paper we propose a new approach which produce 192 bit message digest with more secure and high avalanche effect.
Keywords: cryptography, hashing, data security, encryption, sha-1, MD-5, Execution time, avlanche efect
Edition: Volume 8 Issue 2, February 2019
Pages: 1579 - 1582
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1362 - 1373Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan