Back to Search Start Over

Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications.

Authors :
Leekha, Alka
Shaikh, Alam
Source :
Journal of Discrete Mathematical Sciences & Cryptography. Mar2019, Vol. 22 Issue 2, p323-335. 13p.
Publication Year :
2019

Abstract

A Secure hash algorithm is grounded on the principles of message digest algorithms that are used in the design of the algorithms like MD4 and MD5. The main application of this algorithm is that it can be used in security applications for authentication and data validation like message authentication, digital signature and fingerprinting. It can also be used in detecting duplicate data and uniquely identifying files. In this paper we analyzed the role of some of the building blocks of SHA-2 family.We have demonstrated that the disturbance correction strategy is applicable to the SHA-512 architecture and proved that functions Σ, ∂ are vital for the security of SHA-512, without them it is possible to find collisions with complexity 264 hash operations. We also demonstrated the functioning of 256- bit which was previously designed for 32 bit architecture but in this paper it is implemented using 64- bit architecture. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
09720529
Volume :
22
Issue :
2
Database :
Academic Search Index
Journal :
Journal of Discrete Mathematical Sciences & Cryptography
Publication Type :
Academic Journal
Accession number :
135206058
Full Text :
https://doi.org/10.1080/09720529.2019.1582865