2018
DOI: 10.11591/ijeecs.v11.i3.pp1027-1034
|View full text |Cite
|
Sign up to set email alerts
|

Modified SHA-1 Algorithm

Abstract: Hashes are used to check the integrity of data. This paper modified SHA-1 by incorporating mixing method in every round for better diffusion. The modification increased the hash output to 192-bits. Increasing the output increases the strength because breaking the hash takes longer. Based on the different message types, avalanche percentage of modified SHA-1 showed better diffusion at 51.64%, higher than the target 50%, while SHA-1 achieved 46.61%. The average execution time noted for modified SHA-1 is 0.33 sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 19 publications
1
3
0
Order By: Relevance
“…Additionally, it adapts to concerns regarding email privacy and user identification raised by hashed email approaches. Our comprehensive evaluation, spanning hash construction time comparison, avalanche testing, and attack resistance assessment, provides a holistic understanding of security concerns and validates the proposed enhancements [20]. The realworld applicability of our findings is significant, given the fundamental role of email communication in modern life.…”
Section: Introductionsupporting
confidence: 52%
“…Additionally, it adapts to concerns regarding email privacy and user identification raised by hashed email approaches. Our comprehensive evaluation, spanning hash construction time comparison, avalanche testing, and attack resistance assessment, provides a holistic understanding of security concerns and validates the proposed enhancements [20]. The realworld applicability of our findings is significant, given the fundamental role of email communication in modern life.…”
Section: Introductionsupporting
confidence: 52%
“…Creating a fast and high secure encryption algorithm requires to balance between speed and complexity due to the inverse relationship between them [10][11][12][13]. Increasing the security of any encryption algorithm requires increasing the degree of complexity through adding some additional processes, complex operations, increasing the number of rounds, and so on [14][15][16][17]. is will increase the encryption process time which leads to reduce the algorithm speed [18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…The message to be embedded in the QR code is the name of the student to which the certificate belongs. A modified SHA-1 algorithm [26] was applied to create the hash value. After the hash value is created, the hash will be encrypted using modified blowfish algorithm [27] for added security during the transmission of data to the server.…”
Section: Development Of the Document Integrity Verification Using Qr ...mentioning
confidence: 99%