Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity

@inproceedings{Rao2015AdvancedSA,
  title={Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity},
  author={Siddhartha Rao},
  year={2015}
}
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until recently, SHA-1 was considered to be the most secure hashing algorithm and also remains the most widely used hashing function till date. In this paper, we review various collision search attacks on the original full 80-step SHA-1 algorithm and present a new optimized version of the algorithm that reduces the chance of collision and increases the theoretical lower bound of the time complexity… CONTINUE READING

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

Modified SHA-1 Algorithm

VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Enhanced Secure Hash Algorithm-512 based on Quadratic Function

  • 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM)
  • 2018
VIEW 1 EXCERPT
CITES METHODS