Design and Implementation a New Security Hash Algorithm Based on MD5 and SHA-256

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
A cryptographic hash function has an important role in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. Due to the previous merits the authors present a proposal for a new secure hash algorithm based on the combination of some functions of SHA-256 (Secure Hash Algorithm 256) with its message expansion modification- and MD5 (Message Digest 5) based on double-Davis-Mayer scheme to overcome the weakness existing in these functions.
Download Now

Find By Topic