Full Paper View Go Back

Design and Development of a Dynamic Hashing Algorithm

Nasir Mahmud Apar1 , MD. Minhazul Islam Munna2 , Ahsan Ullah3 , Habibur Rahman4

Section:Research Paper, Product Type: Journal-Paper
Vol.10 , Issue.1 , pp.8-14, Feb-2022


Online published on Feb 28, 2022


Copyright © Nasir Mahmud Apar, MD. Minhazul Islam Munna, Ahsan Ullah, Habibur Rahman . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nasir Mahmud Apar, MD. Minhazul Islam Munna, Ahsan Ullah, Habibur Rahman, “Design and Development of a Dynamic Hashing Algorithm,” International Journal of Scientific Research in Computer Science and Engineering, Vol.10, Issue.1, pp.8-14, 2022.

MLA Style Citation: Nasir Mahmud Apar, MD. Minhazul Islam Munna, Ahsan Ullah, Habibur Rahman "Design and Development of a Dynamic Hashing Algorithm." International Journal of Scientific Research in Computer Science and Engineering 10.1 (2022): 8-14.

APA Style Citation: Nasir Mahmud Apar, MD. Minhazul Islam Munna, Ahsan Ullah, Habibur Rahman, (2022). Design and Development of a Dynamic Hashing Algorithm. International Journal of Scientific Research in Computer Science and Engineering, 10(1), 8-14.

BibTex Style Citation:
@article{Apar_2022,
author = {Nasir Mahmud Apar, MD. Minhazul Islam Munna, Ahsan Ullah, Habibur Rahman},
title = {Design and Development of a Dynamic Hashing Algorithm},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2022},
volume = {10},
Issue = {1},
month = {2},
year = {2022},
issn = {2347-2693},
pages = {8-14},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2690},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2690
TI - Design and Development of a Dynamic Hashing Algorithm
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Nasir Mahmud Apar, MD. Minhazul Islam Munna, Ahsan Ullah, Habibur Rahman
PY - 2022
DA - 2022/02/28
PB - IJCSE, Indore, INDIA
SP - 8-14
IS - 1
VL - 10
SN - 2347-2693
ER -

696 Views    473 Downloads    70 Downloads
  
  

Abstract :
The world is in front of a huge digital revolution. Pragmatically 59% people of the world population are now using the internet for their daily activities related to business, medical, industries, education. It’s a very big challenge to maintain the integrity of the shared data. Those issues can be solved by using a cryptographic technique called hashing. This paper demonstrates a new smooth cryptographic hashing algorithm based on Merkle–Damgård construction structure and Matyas-Meyer-Oseas compression function which generates hashes through 16 rounds where each block contains 256 bits of data. These blocks of data are processed through some existing and newly developed methods like bit scheduler, switching box, shift in column, shift in row, and bit mixing. This proposed algorithm works block-wise and can generate same level of hashes as SHA-512 and MD5. But it uses less time and resources than SHA-512 and MD5 for processing alphabet and numeric data.

Key-Words / Index Term :
Hash, Hashing Algorithm, Bit Mixing, Shift in Row, Shift in Column, Data Integrity, SHA – 512, MD5

References :
[1] Marc Stevens, Elie Bursztein, Pierre Karpman, “The ?rst collision for full SHA-1”, Annual International Cryptology Conference, 2017
[2] Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry, “HAVAL — A one-way hashing algorithm with variable length of output”, Advances in Cryptology — AUSCRYPT `92, 1993, Volume 718, ISBN : 978-3-540-57220-6
[3] Kwok HS, Tang WKS, “A chaos-based cryptographic Hash function for message authentication.”, Int J Bifurcat Chaos 2005; 15:4043–50
[4] Jean-S´ebastien Coron, Yevgeniy Dodis, C´ecile Malinaud, and Prashant Puniya, “Merkle-Damg?ard Revisited : how to Construct a Hash Function”, 2015

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation