Enhancing Security and Speed of Sha-192 with Higher Avalanche
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 2, February 2019

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

In todays world, security is the main issue over internet during transmission of data. Integrity is one of the main factors to guarantee the protection over data. There are many hash algorithms which ensure the integrity. Secure Hash Algorithm can be a capable hashing technique.SHA-3 is the most up to date and efficient Secure Hash Algorithm. In this paper we propose a new approach which produce 192 bit message digest with more secure and high avalanche effect.

Keywords: cryptography, hashing, data security, encryption, sha-1, MD-5, Execution time, avlanche efect

Edition: Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Share this Article

How to Cite this Article?

Sushama Ingale, Arun Jhapate, "Enhancing Security and Speed of Sha-192 with Higher Avalanche", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20195478, Volume 8 Issue 2, February 2019, 1579 - 1582

167 PDF Views | 112 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Similar Articles with Keyword 'hashing'

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1910 - 1915

An Efficient Hash Count Indexing and Searching Scheme for Audio Fingerprinting

Simarjeet Singh Bhatia, Rupali Bhartiya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2228 - 2235

SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication

Derroll David, Divya B, Pournami

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1685 - 1688

An Advanced Data De-duplication Using Novel Variable Size Hashing Technique for Text Files Using Hybrid Cloud Architecture

Haritha Nair, Varsha Botre, Hina Khan, Pritee Nalage, Hiranwale S.B.

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017

Pages: 2718 - 2725

Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing

Safa S. Abdul-Jabbar, Loay E. George

Share this Article

Similar Articles with Keyword 'data security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Similar Articles with Keyword 'encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'sha-1'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2885 - 2889

An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud

Kirti Panmand, Sandeep Kadam

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1886 - 1889

Deduplication Using SHA-1 and IBE with Modified AES

Renuka C. Deshpande, S. S. Ponde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 149 - 153

Evading Flooding Attack in MANET Using Node Authentication

Anup A. Wanjari, Vidya Dhamdhere

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 478 - 482

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this Article

Similar Articles with Keyword 'MD-5'

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 99 - 101

Security and Privacy Issues in High Level MANET Protocol

Kirti Nahak, Babita Kubde

Share this Article

Similar Articles with Keyword 'Execution time'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 842 - 846

Honey Bee Behavior Based Load Balancing of Tasks in Cloud Computing

Harshit Gupta, Kalicharan Sahu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 708 - 710

A Review on Efficient Algorithms for Mining High Utility Item Sets

Nutan Sarode, Devendra Gadekar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1096 - 1101

Parallel Data Shuffling for Hadoop Acceleration with Network Levitated Merge and RDMA for Interconnectivity

Kishorkumar Shinde, Venkatesan N.

Share this Article
Top