Visible to the public Ibn Omar Hash Algorithm

TitleIbn Omar Hash Algorithm
Publication TypeConference Paper
Year of Publication2022
AuthorsShafei, Raed
Conference Name2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
KeywordsComplexity theory, compositionality, Force, hash, hash algorithms, Hash functions, Ibn Omar, Information security, Linguistics, MD5, passwords, privacy, pubcrawl, resilience, Resiliency, SHA-256, SHA-512
AbstractA hash is a fixed-length output of some data that has been through a one-way function that cannot be reversed, called the hashing algorithm. Hashing algorithms are used to store secure information, such as passwords. They are stored as hashes after they have been through a hashing algorithm. Also, hashing algorithms are used to insure the checksum of certain data over the internet. This paper discusses how Ibn Omar's hashing algorithm will provide higher security for data than other hash functions used nowadays. Ibn Omar's hashing algorithm in produces an output of 1024 bits, four times as SHA256 and twice as SHA512. Ibn Omar's hashing algorithm reduces the vulnerability of a hash collision due to its size. Also, it would require enormous computational power to find a collision. There are eight salts per input. This hashing algorithm aims to provide high privacy and security for users.
DOI10.1109/CICN56167.2022.10008341
Citation Keyshafei_ibn_2022