Enhanced Secure Hash Algorithm-512 based on Quadratic Function
Title | Enhanced Secure Hash Algorithm-512 based on Quadratic Function |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | De Guzman, Froilan E., Gerardo, Bobby D., Medina, Ruji P. |
Conference Name | 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM) |
Keywords | avalanche effect, compositionality, cryptography, enhanced secure hash algorithm-512, enhanced SHA-1 algorithm, extended bits, hash algorithms, hash collision, hash collisions, Hash functions, hash message, hash outputs, mobile ad hoc networks, password, primitive function, pubcrawl, quadratic function, Registers, resilience, Resiliency, SHA-1, Urban areas |
Abstract | This paper attempts to introduce the enhanced SHA-1 algorithm which features a simple quadratic function that will control the selection of primitive function and constant used per round of SHA-1. The message digest for this enhancement is designed for 512 hashed value that will answer the possible occurrence of hash collisions. Moreover, this features the architecture of 8 registers of A, B, C, D, E, F, G, and H which consists of 64 bits out of the total 512 bits. The testing of frequency for Q15 and Q0 will prove that the selection of primitive function and the constant used are not equally distributed. Implementation of extended bits for hash message will provide additional resources for dictionary attacks and the extension of its hash outputs will provide an extended time for providing a permutation of 512 hash bits. |
URL | https://ieeexplore.ieee.org/document/8666419 |
DOI | 10.1109/HNICEM.2018.8666419 |
Citation Key | de_guzman_enhanced_2018 |
- hash outputs
- Urban areas
- SHA-1
- Resiliency
- resilience
- Registers
- quadratic function
- pubcrawl
- primitive function
- password
- mobile ad hoc networks
- avalanche effect
- hash message
- Hash functions
- hash collisions
- hash collision
- hash algorithms
- extended bits
- enhanced SHA-1 algorithm
- enhanced secure hash algorithm-512
- Cryptography
- Compositionality