The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

 Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. Th is paper presents a new Secure Hash Algorithm calle d (SHA(192). It uses a famous secure hash algorithm given by the Nationa l Institute of Standard and Technology (NIST).The basic design of SHA( 192 is to have the output length of 192.The SHA(192 has been designed to satisfy the different level of enhanced security and to resist the advanced SHA attacks. The security analy sis of the SHA(192 is compared to the old one given by NIST and gives more security and excellent results as shown in our discussion. In this paper the digital signature algorithm which is given by NIST has been modified using the proposed algorithm s SHA(192. Using proposed SHA(192 hash algorithm a new digital signature schemes is also proposed. The SHA(192 can be used in many applications such s public key cryptosystem, digital signcryption, message authentication code, random g enerator and in security architecture of upcoming wireless devices like software defined radio etc.    


[1] Alfred M., Oorschot P., and Vanstone S., Handbook of Applied Cryptography , CRC press, 1997.

[2] Bruce S., Applied Cryptography: Protocols, Algorithms and Source Code in C , John Wiley and Sons, Canada, 1996.

[3] Stallings W., Cryptography and Network Security Principles and Practices , Prentice Hall Press Upper Saddle River, 2010.

[4] Goldwasser S., Micali S., and Rivest R., A Digital Signature Scheme Secure Against Adaptive Chosen)Message Attacks, Journal on Computing , vol. 17, no. 2, pp. 281)308, 1988.

[5] Ilya M., Hash Functions: Theory, Attacks, and Applications, in Proceedings of Microsoft Research, Silicon Valley Campus, pp. 1)22, 2005.

[6] National Institute of Science and Technology, Secure Hash Standard, Federal Information Processing Standard 180(1 , available at: http:/ http://www.itl.nist.gov/fipspubs/fip180)1.htm, last visited 1995.

[7] National Institute of Science and Technology, Secure Hash Standard, Federal Information Processing Standard 180(2 , available at: http://www.itl.nist.gov/fipspubs/fip180)1.htm, last visited 2002.

[8] National Institute of Standards and Technology, Secure Hash Standard, FIPSPUB180www.itl.nist.gov/fipspub/fips180) 1.html, last visited 2003.

[9] National Institute of Science and Technology, Implementing Cryptography, NIST SP 800, available at: http://csrc.nist.gov/publications/ nistpubs/800)21)1/sp800)21)1_Dec2005.pdf, last visited 2005.

[10] New European Schemes for Signatures, Integrity and Encryption Project, available at: http://www.cryptonessie.org, last visited 2000.

[11] Phan R. and Wagner D., Security Consideration for Incremental Hash Function Based on Pair Blocking Chaining, in Proceedings of Computers and Security , USA, pp. 131)136, 2006.

[12] Rivest R., Shamir A., and Adleman L., A Method for Obtaining Digital Signature and Public)Key Cryptosystems, Communication of The ACM , vol. 21, no. 2, pp. 120)126, 1978.

[13] Sklavos N., Alexopoulos E., and Koufopavlou O., Networking Data Integrity: High Speed Architectures and Hardware Implementations, The International Arab Journal of Information Technology , vol. 1, no. 0, pp. 54)59, 2003.

[14] United States Department of Commerce, National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication, 1977.

[15] William S., Cryptography and Network Security, Principles and Practice , Prentice Hall of India, 2005. Thulasimani Lakshmanan has obtained her BE and ME degree from Coimbatore Institute of Technology, India in 1998 and 2001 respectively. She has started her teaching profession in the year 2001 in PSNA Engineering College, Dindigul. At present she is an Lecturer in Departme nt of Electronic and Communication Engineering in PSG College of Technology, Coimbatore. She has published 4 research papers in international journa ls and 4 papers in International conferences. She is a part time research scholar in Anna University Chennai. Her areas of interest are wireless securit y, networking and signal processing. She is a life member of ISTE. Madheswaran Muthusamy has obtained his PhD degree in electronics engineering from Institute of Technology, Banaras Hindu University, Varanasi in 1999 and ME degree in microwave engineering from Birla Institute of Technology, Ranchi, India. He has started his teach ing profession in the year 1991 to serve his parent Institution Mohd. Sathak Engineering College, Kilakarai where he obtained his Bachelor Degree in ECE. He has been awarded Young Scientist Fellowship by the Tamil Nadu State Council for science and technology and Senior Research Fellowship by Council for Scientific and Industrial Research, New Delhi in the year 1994 and 1996 respectively. He has published 120 research papers in International and National Journals as well as conferences. His field of interest includes semiconductor devices, microwave electronics, optoelectronics and signal processing. He is a senior member of IEEE, Fellow of IETE, and IE and member of ISTE.