Loading

Design of Dynamic Digest through Polynomial Product for Improved Avalanche Effect on Keyless Hash Function
P. Karthik1, P. Shanthi bala2 

1P.K ARTHIK, Research Scholar, Department of Computer Science, School of Engineering and Technology, Pondicherry University, Kalapet, Puducherry, India.
2Dr. P. SHANTHI BALA, Assistant Professor, Department of Computer Science, School of Engineering and Technology, Pondicherry University, Kalapet, Puducherry, India.

Manuscript received on 07 March 2019 | Revised Manuscript received on 13 March 2019 | Manuscript published on 30 July 2019 | PP: 3194-3204 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2376078219/19©BEIESP | DOI: 10.35940/ijrteB2376.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The integrity violation of remote data draws more significance after the advent of cloud solutions. The conventional digest functions like MD4, MD5, SHA-160, SHA-2 family, and SHA-3 family provide a more elegant solution for the aforesaid problem. But the breaking of MD4, MD5, and SHA-160 algorithms and the partisal breaking of the families of SHA-2 and SHA-3 raises concerns about their use on cryptographic applications. In addition, they do not provide the facility to decide the hash output length dynamically at runtime. This work attempts to address the aforesaid problems through polynomial products. The proposed design uses a higher-order two-variables polynomial function to establish the hash output. The application of polynomial function at the block-level helps the proposed design to produce variable length hash output. The experimental analysis of avalanche response, the effect of an avalanche on the hash output nibbles, and the analysis of confusion and diffusion prove the proposed design performs exceedingly well than the conventional algorithms. Therefore, the proposed design could be considered as a more suitable alternative for the conventional keyless digest function in the perspective of security.
Index Terms: Data Integrity Confirmation Through Polynomial Function, Dynamic Digest Function, Enhancing the Avalanche Effect Through Polynomial Function, One-Way Dynamic Digest Function, Polynomial Function for Message Authentication.

Scope of the Article: Production