A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Thulasimani Lakshmanan1, Madheswaran Muthusamy2
1Lecturer, Department of ECE PSG College of Technology, Coimbatore
2Principal Muthayammal Engineering College, Rasipuram
 
Abstract: Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. This paper presents a new secure hash algorithm called SHA-192. It uses a famous secure hash algorithm given by the National Institute of standard and technology (NIST).The basic design of SHA-192 is to have the output length of 192.The SHA-192 has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. The security analysis of theSHA-192 is compared to the old one given by NIST and gives more security and excellent results as shown in our discussion. In this paper the digital signature algorithm which is given by NIST has been modified using the proposed algorithms SHA-192. Using proposed SHA-192hash algorithm a new digital signature schemes is also proposed. The SHA-192 can be used in many applications such s public key cryptosystem, digital signcryption, message authentication code, random generator and in security architecture of upcoming wireless devices like Software defined radio etc.

Keywords: Data integrity, hash algorithm, digital signature, pre-image, message digest, and message authentication.

Received September 29, 2009; accepted August 10, 2010

Read 4276 times Last modified on Tuesday, 15 November 2011 02:18
Share
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…