Abstract
In this technological world, all sorts of information transactions of governmental and non-governmental organizations are being done through internet. Everybody is using WhatsApp, Facebook, Instagram or other social sites. All the information that is floating on the internet is on high risk because of unethical practices of Internet users. So the cybercrime is a crucial matter among us. Information security is now challenging issue for global community. There are so many techniques comes under various security methods like data confidentiality, authentication, access control, data integrity, and more. Authentication is one of the most prominent security services. MD5 or SHA are the most popular cryptographic hash functions that are widely used in internet applications and protocols to provide authenticity. Their concept is very easy to implement and provides high level of security. In this paper, we have proposed a new construction of hash function scheme named SS-XORHF (Sequential Shift–XOR based Hash Function) for message authentication. Our scheme, SS-XORHF, is multifaceted so provide very complex hash code for authentication which gives strong security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhuoyu H, Yongzhen L (2022) Design and implementation of efficient hash functions. In: Published in IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA)
Ambedkar BR, Bharti PK, Husain A (2021) Design and analysis of hash algorithm using autonomous initial value proposed secure hash algorithm64. In: Published in IEEE 18th India Council International Conference (INDICON)
De Guzman FE, Gerardo BD, Medina RP (2019) Implementation of enhanced secure hash algorithm towards a secured web portal. In: Published in IEEE 4th International conference on computer and communication systems (ICCCS)
Mirvaziri H, Jumari K, Ismail M, Hanapi ZM (2007) A new hash function based on combination of existing digest algorithms. In: published in IEEE 5th Student Conference on Research and Development
Muller F (2004) The MD2 hash function is not one-way. ASIACRYPT.pp 214–229
Den Boer B, Bosselaers A (1991) An attack on the last two rounds of MD4.
Dobbertin (1995) Cryptanalysis of MD4
Schneier on Security: Cryptanalysis of SHA-1 http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
Schneier on Security: NIST Hash Workshop Liveblogging (5) http://www.schneier.com/blog/archives/2005/11/nist_hash_works_4.html
Hash cracked–heise Security http://www.heise-online.co.uk/security/Hash-cracked--/features/75686/2
Yavuz AA et al. (2019) Ultra lightweight multiple-time digital signature for the internet of things devices. Publ IEEE Trans Serv Comput (IEEE TSC)
Santini P et al. (2019) Cryptanalysis of a one-time code-based digital signature scheme. Publ IEEE Int Symp Inf Theory (ISIT)
Ali AM et al. (2020) A novel improvement with an effective expansion to enhance the md5 hash function for verification of a secure E-document. Publ IEEE Access 8:80290–80304
Samiullahet M et al (2020) An image encryption scheme based on dna computing and multiple chaotic systems. Published by IEEE Access 8:25650–25663
De Guzman et al. (2019) Implementation of enhanced secure hash algorithm towards a secured web portal. 2019 IEEE 4th International conference on computer and communication systems, IEEE Xplore
Singh L et al. (2020) Secure data hiding techniques. Published by Multimedia Tools and Applications, pp 15901–15921
Ahmed AA, Ahmed WA (2019) An effective multifactor authentication mechanism based on combiners of hash function over internet of things. Published by Sensors MDPI. [online] Available https://doi.org/10.3390/s19173663
Mitra P (2018) Recent advances in cryptography and network security. IntechOpen
Wang JY, Li YZ (2013) The design and realization of the single-block hash function for the short message. Appl Mech Mater 411–414:53–59
Biblography
Bellare M, Canetti R, Krawczyk H (1996) Keying hash functions for message authentication
Bellare, M., Canetti, R. and Krawczyk, H (1996) Keying hash functions for message authentication. In: Crypto 96 Proceedings, Lecture notes in computer science vol.1109. N. Koblitz ed., Springer-Verlag
Schheier B Applied cryptography, 2nd edition
Leuven KU, Mercierlaan K Cryptographic hash functions: an overview, vol 94. Bart Preneel1ESAT-COSIC Laboratory, B-3001 Leuven, Belgium
Preneel B (2003) Analysis and design of cryptographic hash functions
Safdari M, R Joshi (2009) Evolving universal hash functions using genetic algorithms. In: the Proceedings of the IEEE International Conference on Future Computer and Communication, pp 84- 87. ISBN: 978–0-7695–3591-3. 10.1109/ICFCC.2009.66
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhati, S., Bhati, A., Gaur, S. (2023). An Expert Sequential Shift-XOR-Based Hash Function Algorithm. In: Rathore, V.S., Tavares, J.M.R.S., Piuri, V., Surendiran, B. (eds) Emerging Trends in Expert Applications and Security. ICE-TEAS 2023. Lecture Notes in Networks and Systems, vol 681. Springer, Singapore. https://doi.org/10.1007/978-981-99-1909-3_42
Download citation
DOI: https://doi.org/10.1007/978-981-99-1909-3_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1908-6
Online ISBN: 978-981-99-1909-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)