首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:Design of Secure Cryptographic Hash Function Using Soft Computing Techniques
  • 本地全文:下载
  • 作者:S.Santhanalakshmi ; Sangeeta K ; G K Patra
  • 期刊名称:International Journal of Advances in Soft Computing and Its Applications
  • 印刷版ISSN:2074-8523
  • 出版年度:2017
  • 卷号:9
  • 期号:2
  • 页码:188
  • 出版社:International Center for Scientific Research and Studies
  • 摘要:Data integrity is a crucial part of any secure system. Cryptographic hash functions serve as a basic building block of information security for ensuring data integrity and data origin authentication. They are used in numerous security applications such as digital signature schemes, construction of MAC and random number generation. A hash function takes an arbitrary amount of input and produces an output of fixed size. Many of the widely used cryptographic MD-5 and SHA-1 hash functions have been shown to be vulnerable to attacks. The non linear behavior of the neural network model which takes multiple inputs to produce single output makes it a perfect entrant for cryptographic hash design. The paper describes the construction of a cryptographic hash function using a multi layer Tree Parity Machine neural network. Although in our simulations we have considered 512 bit message blocks which generate 128 digit hash value, the proposed algorithm can be used flexibly to generate a hash function of arbitrary length. Simulations show that this hash function satisfies the security requirements of confusion, diffusion, and collision attack
  • 关键词:Hash Function; Tree Parity Machine; Neural Synchronization; Collision; Message Authentication Code.
国家哲学社会科学文献中心版权所有