..............................
            ..............................
            ..............................
            
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
        
         Hash  functions  are  the  most  widespread  among  all  cr yptographic  primitives,  and  are  currently  used  in  multiple 
cryptographic schemes and in security protocols. Th is paper presents a new Secure Hash Algorithm calle d (SHA(192). It uses 
a famous secure  hash algorithm given  by the  Nationa l Institute of  Standard and  Technology (NIST).The basic  design of  SHA(
192 is to have the output length of 192.The SHA(192  has been designed to satisfy the different level of enhanced security and to 
resist  the  advanced  SHA  attacks.  The  security  analy sis  of  the  SHA(192  is  compared  to  the  old  one  given   by  NIST  and  gives 
more security and excellent results as shown in our  discussion. In this paper the digital signature algorithm which is given by 
NIST  has  been  modified  using  the  proposed  algorithm s  SHA(192.  Using  proposed  SHA(192  hash  algorithm  a  new  digital 
signature  schemes  is  also  proposed.  The  SHA(192  can   be  used  in  many  applications  such  s  public  key  cryptosystem,  digital 
signcryption,  message  authentication  code,  random  g enerator  and  in  security  architecture  of  upcoming  wireless  devices  like 
software defined radio etc.  
     
            [1] Alfred M., Oorschot P., and Vanstone S., Handbook of Applied Cryptography , CRC press, 1997.
[2] Bruce S., Applied Cryptography: Protocols, Algorithms and Source Code in C , John Wiley and Sons, Canada, 1996.
[3] Stallings W., Cryptography and Network Security Principles and Practices , Prentice Hall Press Upper Saddle River, 2010.
[4] Goldwasser S., Micali S., and Rivest R., A Digital Signature Scheme Secure Against Adaptive Chosen)Message Attacks, Journal on Computing , vol. 17, no. 2, pp. 281)308, 1988.
[5] Ilya M., Hash Functions: Theory, Attacks, and Applications, in Proceedings of Microsoft Research, Silicon Valley Campus, pp. 1)22, 2005.
[6] National Institute of Science and Technology, Secure Hash Standard, Federal Information Processing Standard 180(1 , available at: http:/ http://www.itl.nist.gov/fipspubs/fip180)1.htm, last visited 1995.
[7] National Institute of Science and Technology, Secure Hash Standard, Federal Information Processing Standard 180(2 , available at: http://www.itl.nist.gov/fipspubs/fip180)1.htm, last visited 2002.
[8] National Institute of Standards and Technology, Secure Hash Standard, FIPSPUB180www.itl.nist.gov/fipspub/fips180) 1.html, last visited 2003.
[9] National Institute of Science and Technology, Implementing Cryptography, NIST SP 800, available at: http://csrc.nist.gov/publications/ nistpubs/800)21)1/sp800)21)1_Dec2005.pdf, last visited 2005.
[10] New European Schemes for Signatures, Integrity and Encryption Project, available at: http://www.cryptonessie.org, last visited 2000.
[11] Phan R. and Wagner D., Security Consideration for Incremental Hash Function Based on Pair Blocking Chaining, in Proceedings of Computers and Security , USA, pp. 131)136, 2006.
[12] Rivest R., Shamir A., and Adleman L., A Method for Obtaining Digital Signature and Public)Key Cryptosystems, Communication of The ACM , vol. 21, no. 2, pp. 120)126, 1978.
[13] Sklavos N., Alexopoulos E., and Koufopavlou O., Networking Data Integrity: High Speed Architectures and Hardware Implementations, The International Arab Journal of Information Technology , vol. 1, no. 0, pp. 54)59, 2003.
[14] United States Department of Commerce, National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication, 1977.
[15] William S., Cryptography and Network Security, Principles and Practice , Prentice Hall of India, 2005. Thulasimani Lakshmanan has obtained her BE and ME degree from Coimbatore Institute of Technology, India in 1998 and 2001 respectively. She has started her teaching profession in the year 2001 in PSNA Engineering College, Dindigul. At present she is an Lecturer in Departme nt of Electronic and Communication Engineering in PSG College of Technology, Coimbatore. She has published 4 research papers in international journa ls and 4 papers in International conferences. She is a part time research scholar in Anna University Chennai. Her areas of interest are wireless securit y, networking and signal processing. She is a life member of ISTE. Madheswaran Muthusamy has obtained his PhD degree in electronics engineering from Institute of Technology, Banaras Hindu University, Varanasi in 1999 and ME degree in microwave engineering from Birla Institute of Technology, Ranchi, India. He has started his teach ing profession in the year 1991 to serve his parent Institution Mohd. Sathak Engineering College, Kilakarai where he obtained his Bachelor Degree in ECE. He has been awarded Young Scientist Fellowship by the Tamil Nadu State Council for science and technology and Senior Research Fellowship by Council for Scientific and Industrial Research, New Delhi in the year 1994 and 1996 respectively. He has published 120 research papers in International and National Journals as well as conferences. His field of interest includes semiconductor devices, microwave electronics, optoelectronics and signal processing. He is a senior member of IEEE, Fellow of IETE, and IE and member of ISTE.
