International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
A Novel Design For Generating Dynamic Length Message Digest To Ensure Integrity Using Block Cipher Approach Umesh Gandhi1, Dr.(Mrs.) Poonam Sinha2, Ms. Rachna Kulhare3 1(Department
of I.I., UIT, Barkatullah University, Bhopal (M.P.), Inda) Department of E&C, UIT, Barkatullah University, Bhopal (M.P.), India) 3(Asst. Professor, Department of I.T., UIT, Barkatullah University, Bhopal (M.P.), India) 2(Professor,
-------------------------------------------------------------------***-------------------------------------------------------------Abstract- In today’s life, security is one of the major b. For a given Message Digest MD (M), it should be concerns as our modern technologies changes. To ensure the integrity over the stored or transmitted data hash algorithms are designed, but as the time moves all the existing standard algorithms are either proven breakable or found not efficient to use. This paper has raised their voice on this direction and proposed their own new algorithm that can generates a hash with totally different way. It generates a dynamic size hash on the principal of cryptographic encryption/ decryption algorithm. An implementation result shows its strength and efficiency against existing hash algorithms.
practically impossible to find Message (M). c. For a given Message (M), it should be practically impossible to fine Message (M’) such that Message Digest of (M) is equal to Message Digest of (M’). d. For a given Message (M) and Message Digest (MD), little change in (M) should generate totally different Message Digest (MD). Many algorithms have been designed up to now, to ensure the integrity, some standard algorithms are MD Family and SHA Family, but unfortunately today’s date all the existing algorithms are either proven breakable or not in use because of its inefficiency in terms of execution timing.
Keywords: Computer Security, SHA, Hash, Message Digest
1. INTRODUCTION With the rapid change in the modern technologies there is always a requirement to develop or modernize the existing solutions that ensure the security. Integrity is one of the most important principal of security. It ensures the originality of received data packet.
Latest in 2009, due to security issues MD2 from MD Family get disappear in Open SSL and other network security services. A collision attack that was published in year 2007, found a collision on MD4 from MD family in less than two hash operations.
Many hash algorithms have been designed to ensure the integrity over data packet. These algorithms generate a digest of fixed size i.e. finally transmitted with the data packet. At the other end, receiver receives the data packet along with its digest. The data packet again passed with the same hash algorithm to generate another digest. If the received digest is same as the generated digest it means the data packet is original otherwise it is not.
An attack found in 2013; break the MD5 algorithm again form MD family in just 218 operations. An attack called boomerang attack make the complexity to find collision in SHA-0 is about 233.6 operations. Also, SHA-1 from SHA family also produces hash collision in between 260.3 to 265.3 operations. After that many variants of have been designed by the researchers in order to generate a successful and secured digest but all of them get failed.
The digest generated by the hash algorithm must have the following four properties: a. For a given message (M), it is easy to compute Message Digest MD (M).
© 2017, IRJET
|
Impact Factor value: 5.181
Latest, Meng-jiao Wang, Yong-zhen Li present their research with a name “Hash Function with Variable Output Length” in which they have designed an |
ISO 9001:2008 Certified Journal
|
Page 768