IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July, 2013, Pg. 24-32

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

An approach for high security by using efficient sha176 1

Snehlata Singh, 2 Prof. Gajendra Singh Chandel

1

2

Computer Science & Engineering, SSSIST Sehore, Madhya Pradesh, India Professor, Computer Science & Engineering, SSSIST Sehore, Madhya Pradesh, India 1

[email protected], 2 [email protected]

Abstract This paper develops a stronger and safer cryptographic algorithm which would not only be secure, but also reduces total time taken in providing integrity of information. Hash functions were introduced in cryptology as a tool to protect the integrity of information. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified security flaws, namely that a possible mathematical weakness might exist. This point out that stronger hash function would be desirable.SHA-1 and MD-5 is among the most commonly used hash function message digest algorithms. Scientists have found collision attacks on SHA-1, MD-5 hash functions so the natural response to overcome this threat was assessing the weak points of these protocols that actually depend on collision resistance for their security. So to increase the security, modified SHA-176 is introduced in this paper having a message digest of length 176 bits with larger bit difference. So the new solution will be no longer vulnerable to the collision attacks [2].

Keywords: Cryptography, Data Integrity, Security, SHA, Hash, Message Digest.

1. Introduction Cryptography is the study of mathematical techniques related to aspects of information security, such as confidentially or privacy, data integrity and entity authentication. Data Integrity [1] Ensuring that information has not been altered by unauthorized or unknown means. One must have the ability to detect data manipulation by unauthorized parties. Data manipulation includes such things as insertion, deletion, and substitution. The main goal of cryptography [8] is to make it possible for two people to exchange a message in such a way that other people cannot understand the message. There is no end to the number of ways this can be done, but here we will be concerned with methods of altering the text in such a way that the recipient can undo the alteration and discover the original text. Hash functions were introduced in cryptography to provide message integrity and authentication [4, 5] .A function that compresses an input of arbitrary large length into a fixed small size hash code is known as hash function. The input to a hash function is called as a message or plain text and output is often referred to as message

Snehlata Singh, IJRIT

24

digest, the hash value, hash code, hash result or simply hash. In hash function is defined as: A hash function H is a transformation that takes an input m and returns a fixed size string, which is called the hash value h (that is, h = H (m)). In this paper we propose a new hash function say SHA-176 that focus on the security enhancement of existing SHA-1. Certain modifications are proposed in the existing one, the message digest length has been increased by extra 16 bits. If the hash value is not same at receiving end then message has been considered unacceptable. Hence the proposed modifications are enhancing the security and robustness of the existing algorithm. Organization of the paper is as follow: section two is the proposed work, section three is the result analysis and finally section four is the conclusion and future enhancement.

2. Comparative Study of Existing Hash Function (SHA-160 and SHA-192) 2.1 SHA-160 Hash Function From an input message the SHA-1 produces a single output of 160-bit message digest (the output hash value). The input message is composed of multiple blocks. The input block, of 512 bits, is divided into 80 of 32-bit words, denoted as, one 32-bit word for each computational round of the existing SHA-1 algorithm1. Every round comprises various operation like additions and logical operations, and bitwise logical operations and bitwise rotations to the left. Total calculation of the algorithm depends on the round being executed, as well as the value of the constant. The SHA-1 80 iteration are splits into four groups of 20 iteration, each with different values for and the applied logical functions [6]. 2.2 SHA-192 Hash Function SHA-192 [3] is the extension of the SHA-160 algorithm. In this algorithm chaining variable is increased by one more variable. Due to this change message digest generated is of 192 bits. The extended sixteen 32 bit into eighty 32 bit words are given as input to the round function and some changes has been done in shifting of bits in chaining variables[4].

3. Development of Enhanced SHA-176 Algorithm The new dedicated hash function is algorithmically similar to SHA-1. Number of rounds in SHA-176 is same as that of SHA-1.Eleven chaining variable of 16 bits is used in proposed algorithm therefore message digest generated by the hash function is increased by 176 bits. The word size is reconstructed from 32 bits to 16 bits. The extended thirty two 16 bits into eighty 16 bits words are given as input to the round function. The SHA-176 algorithm has eighty steps in all and in each step there is an elementary function which calculates a message digest every time and sends it to the next step. There are significant changes in the elementary function of the secure hash algorithm and also give us a message digest of length 176 bits. In order to increase the security aspects of the algorithm the number of bits in message digest should be increased .To achieve this first, number of bits generated by message digest is considerably increased, which makes SHA-176 more complex in breaking. The modified structure of SHA-176 algorithm is given in figure 3.1.

Snehlata Singh, IJRIT

25

Figure 3.1: Proposed SHA-176 Architecture 3.1 Steps of Algorithm Step 1: Padding: The first step in SHA-176 is to add padding bits to the original message. The aim of this step is to make the length of the original message equal to a value, which is 64 bits less than an exact multiple of 512. We pad message M with one bit equal to 1, followed by a variable number of zero bits. Step 2: Append length: After padding bits are added, length of the original message is calculated and expressed as 64 bit value and 64 bits are appended to the end of the resultant message of step 1. Step 3: Divide the input into 512 bit blocks: Divide the input message into blocks, each of length 512 bits, i.e. cut M into sequence of 512 bit blocks M1, M2…..MN. Each of Mi parsed into thirty-two 16 bits words Mi0, Mi1……...Mi32 Step 4: Initialize chaining variables the hash is 176 bits used to hold the intermediate and final results. Hash can be represented as eleven 16 bits word registers, A,B,C,D,E,F,G,H,I,J,K.. Initial values of these chaining variables are: A = 6745 B = 2301 C = EFCD D = AB89 E = 98BA

Snehlata Singh, IJRIT

26

F = DCFE G = 1032 H = 5476 I = C3D2 J = E1F0 K = 4038 The compression function maps 176 bits value H=(A,B,C,D,E,F,G,H,I,J,K) and 512 bit block Mi into 176 bits value. The shifting of some of the chaining variables by 11 bits in each round will increase the randomness in bit change in the next successive routines. If the minimum distance of the similar words in the sequence is raised then the randomness will significantly raises. A different message expansion is employed in this hash function in such a way that the minimum distance between the similar words is greater compared with existing hash functions Step 5: Processing: After pre-processing is completed each message block is processed in order using following steps: I) For i = 1 to N prepare the message schedule. Mit , 0 ≤ t ≤ 31 Wt = (Wt-6 Wt-16 Wt-14 Wt-32) << 1 II) Initialize the eleven working variables A11, A12, B11,B12,C11,C12,D11,D12,E11,E12,F with (i-1)st hash value. III) For t = 0 to 79 { A11 = S2 (A11ΛA12); A12 = F; B11 = S2 (B11ΛB12); B12 =A11; C11 = S2 (C11ΛC12); C12 = S11 (F); D11 = S2 (D11ΛD12) D12 = E11ΛFunct (B11,C11,D11) ΛWtΛKt E11 = S2 (E11ΛE12) E12 = S8 (E11ΛFunct(B11,C11,D11) ΛWtΛKt) F = S2 (E11ΛFunct(B11,C11,D11) ΛWtΛKt)

Snehlata Singh, IJRIT

27

} Where Kt is a constant defined by a Table 3.1, F1 is a bitwise Boolean function, for different rounds defined by, Funct (B11, C11, D11) = IF B11 THEN C11 ELSE D11 Funct (B11, C11, D11) = B11 XOR C11 XOR D11 Funct (B11, C11, D11) = MAJORITY (B11, C11, D11) Funct (B11, C11, D11) = B11 XOR C11 XOR D11 Where the “IF….THEN……ELSE “function is defined by IF B11 THEN C11 ELSE D11 = (B11ΛC11) V ((¬B11) ΛD11) And “MAJORITY“ function is defined by MAJ (B11, C11, D11) = (B11ΛC11) V (C11ΛD11) V (D11ΛB11) Here, S2, S8 and S11 are left shift of 2 bit, 8 bit and 11 bit respectively IV)

H01 (i) = A11 + H01 (i-1) H02 (i) = A12 + H02 (i-1) H11 (i) = B11 + H11 (i-1) H12 (i) = B12 + H12 (i-1) H21 (i) = C11 + H21 (i-1) H22 (i) = C12 + H22 (i-1) H31 (i) = D11 + H31 (i-1) H32 (i) = D12 + H32 (i-1) H41 (i) = E11 + H41 (i-1) H42 (i) = E12 + H42 (i-1) H51 (i) = F

+ H5 (i-1) Table 3.1: Coefficients of each round

Rounds

Steps

F1

Kt

1

0-19

IF

FA92

2

20-39

XOR

6ED9

3

40-59

MAJ

8F1B

Snehlata Singh, IJRIT

28

4

60-79

XOR

CA62

4. Result Analysis This section is providing analysis of proposed algorithm on the basis of different parameters like number of round; block size, maximum message size and word size all are measurable in bits for SHA-176. And security and time efficiency for encryption/decryption algorithm, Dot Net implementation has used to test these algorithms. 4.1 Result Analysis of SHA-176 The hashing algorithms SHA-1, SHA-192 and Proposed SHA-176 were tested based on the security and time needed to generate message digests for the text data. Based on the simulation results, it was found that proposed SHA-176 needs more time to generate a message digest when compared with SHA-1 because the message digest generated by the proposed algorithm longer than the existing SHA-1. But as compare SHA-192 it’s taking less amount of time. We have an extra block of 16 bits in the primary function and so it produces message digest of length 176 bits. Hence the security of the existing algorithm gets improved. It time to break 176 bit message digest will be more when compared with the exiting SHA-160. When comparing the bit difference [7], it is found that the bit difference in SHA-176 is more than existing SHA-1 after changing the single word in the message. Table 4.1 is showing bits wise comparisons between existing SHA and Proposed SHA-176. Table 4.2 is showing execution time comparison between existing and proposed SHA. Table 4.3 showing the bit difference of proposed algorithm is more than existing. Table 4.1: Bits wise comparison between Existing SHA-160, SHA-192 and SHA-176 Algorithm Algorithms

Output size (bits)

Rounds

SHA-160

160

80

SHA-176

176

80

SHA-192

192

80

Table 4.2: Timing Comparison between Existing SHA-160, SHA-192 and SHA-176 algorithms for a 15 KB file. Algorithms

Hashing Timing

SHA-160

0.640

SHA-176

0.781

Snehlata Singh, IJRIT

Message digested A5909C8B 4FD1A3A5 7587C047

10265E5B

D7F0156

B860

D025

A28C

5E94 1B06

EF2F 766D

74AC 3666

7712

C9E1

29

SHA-192

1.593

BC231045

42BF0FCD

89F2FAB6

E5C0F8E4

825F6F96

316D1735

Figure 4.1 shows the graphical representation of table 4.2, with execution time of existing SHA and Proposed SHA-176 algorithms. According to the graph, there is a tendency that execution time for Proposed SHA176 algorithm, increases with file size. But required time for the execution through Proposed SHA-176 is much smaller than execution time for compared SHA-192.

Hashing Time 1.6 1.4 1.2 1 Hashing Time

0.8 0.6 0.4 0.2 0 SHA-160

SHA-176

SHA-192

Figure 4.1: Execution time (in Second) comparison between SHA-160, SHA-192 with SHA-176 for a 15 KB file

Snehlata Singh, IJRIT

30

Bit Difference 50 45 40 35 30 25 20 15 10 5 0

Bit Difference

SHA-160

SHA-176

SHA-192

Figure 4.2: Bit Difference Comparison between SHA-160, SHA-192 with SHA-176 on same file

Table 4.3: Bit Difference Comparison between existing SHA-160, SHA-192 and SHA-176 algorithm after changing a single character

Message

SHA-160

SHA-176

SHA-192

40.625%

50%

34.375%

the quick brown fox jumps over lazy dog the quick brown fox jumps over lazy mog

Snehlata Singh, IJRIT

31

6. Conclusion and Future Work At the end we have come to the conclusion that the use of proposed system will increase the security, integrity of the message during the transmission of the message from sender to the receiver end. This proposed model also requires less security by the transmission system during it transmit. Strength of our “Proposed SHA-176” is very high compare to SHA-160 algorithm. If the security, efficiency are primary concern then one can use our proposed algorithm. From the above discussions we have concluded that the proposed SHA-176 algorithm has better efficiency in terms of execution time as compare to SHA-192 and security as compare to SHA-160.Some results obtained by the system can be found in Tables and figures. The results show that our proposed SHA-176 algorithm is faster than SHA-192 and more powerful than SHA 160.

7. References [1] P. P Charles & P.L Shari, "Security in Computing:

4th edition", Prentice-Hall, lnc.2008.

[2] [6] X. Wang, H. Yu and Y.L. Yin,“Efficient Collision Search Attacks on SHA-0”,(Pub 2005) . [3] Harshvardhan Tiwari and Dr. Krishna Asawa “A Secure Hash Function MD-192 with Modified Message Expansion” (IJCSIS) International Journal of Computer Science and Information Security, Vol. VII, No. II, FEB 2010. [4].L.Thulasimani and M.Madheswaran “Security and Robustness Enhancement of Existing Hash Algorithm” IEEE International Conference on Signal Processing Systems 2009. [5] Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, and Stamatis Vassiliadis “Cost-Efficient SHA Hardware Accelerators” IEEE Transactions On Very Large Scale Integration (Vlsi) Systems, Vol. 16, No. 8, August 2008. [6] A new Hash Function Based on Combination of Existing Digest Algorithms pub 2007. [7] Avalanche effect http://en.wikipedia.org/wiki/Avalanche_effect. [8] William Stallings, “Cryptography and Network Security: Principles and Practice. Third edition, Prentice Hall.2003. [9] Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby, “Collision in SHA-0 and Reduced SHA- 1,”Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, Springer- Verlag,2005.

Snehlata Singh, IJRIT

32

An approach for high security by using efficient sha- 176

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, ... 2Professor, Computer Science & Engineering, SSSIST Sehore, Madhya .... Table 4.1: Bits wise comparison between Existing SHA-160, SHA-192 and ...

446KB Sizes 4 Downloads 176 Views

Recommend Documents

An Efficient Approach for Subspace Clustering By ...
Optimization: configuration of telephone connections, VLSI design, time series ... The CAT seeker algorithm will support for three dimensional databases only.

Conscience online learning: an efficient approach for ... - Springer Link
May 24, 2011 - as computer science, medical science, social science, and economics ...... ics in 2008 and M.Sc. degree in computer science in 2010 from Sun.

An efficient direct differentiation approach for sensitivity ...
tem and requires minimum data storage. The use of ... multirate integrations methods, and a large amount of data (the complete state of the system at each ...

Sha Tin College - Sha Tin Junior School
Apr 19, 2016 - Sha Tin College 沙田學院. 3 Lai Wo Lane · Fo Tan · Sha Tin. New Territories · Hong Kong. 香港新界沙田火炭麗禾里 3 號. Tel: 電話 + 852 2699 ...

An Efficient Direct Approach to Visual SLAM
homogeneous transformation matrix T ∈ SE(3). A. Lie Algebra se(3) and the Lie Group SE(3). Let Ai, i = 1, 2,..., 6, be the canonical basis of the Lie algebra se(3) ...

An Efficient Direct Approach to Visual SLAM
data association is error-prone, care must be taken in order to .... Other systems recover and de- compose the ..... where card(·) denotes the cardinality of the set.

an efficient signal-matching approach to melody ...
audio (average 3.6 minutes per song). 155 of the songs .... An integrated pitch tracking algorithm for speech systems. In IEEE Int. Conf. Acoust., Speech.

An Efficient Convex Optimization Approach to 3D ...
evolution, which allows a large time step-size to accelerate the speed of .... (8) is dual to the convex relaxation problem (7), by means of similar analytical .... the high anisotropy of the sampled 3D prostate MRI data does interfere achieving.

An Efficient Synchronization Technique for ...
Weak consistency model. Memory read/write sequential ordering only for synchronization data. All the data can be cached without needing coherence protocol, while synchronization variables are managed by the. SB. Cache invalidation required for shared

An Efficient MR Inhomogeneity Corrector Using ...
flexibility of being data-driven compared to prospective correction which usually requires a specific protocol ... Fast Image Recovery Using Variable Splitting and.

3D Object Retrieval using an Efficient and Compact ...
[Information Storage and Retrieval]: Information Search and Retrieval. 1. ... shape descriptor that provides top discriminative power and .... plexity which is prohibitive for online interaction as well as .... degree of significance, we can intuitiv

An Efficient Synchronization Technique for ...
Low-cost and low-power. Programmed with ad ... and low-power optimization of busy-wait synchronization ... Using ad hoc sync. engine is often a must for embedded systems ... Critical operation is the Associative Search (AS) phase. On lock ...

Theories and Techniques for Efficient High-End ...
Aug 27, 2007 - 4.7 Mapping between power profile and code segments for FT benchmark . ...... several techniques of multi-speed disks, data migration, and ...

JUNIPER: Towards Modeling Approach Enabling Efficient Platform for ...
Performance Computing (HPC) and hardware acceleration with .... handling the problem of designing multi-cloud applications are: (i) choosing a modeling ...

Efficient Symbol Sorting for High Intermediate ...
increases the intermediate recovery rate of LT codes, while it preserves the ..... The first code we employ is the LT code used in Raptor codes [9] with degree.

JUNIPER: Towards Modeling Approach Enabling Efficient Platform for ...
ABSTRACT. Big Data is a modern phenomenon that promises to bring unprecedented economical benefits. Hadoop-like MapReduce implementations has ...

Efficient High Resolution Relaxation Schemes For ...
Int. J. Numer. Meth. Fluids 2000; 00:1–6. Prepared using fldauth.cls [Version: 2002/09/18 v1.01]. Efficient High Resolution Relaxation Schemes For Hyperbolic ..... aui+1 − a. 2 φ− i+1 (ui+2 − ui+1) , a < 0. Now depending on the direction of

A Hardware Intensive Approach for Efficient Implementation of ... - IJRIT
conventional Multiply and Accumulate (MAC) operations. This however tends to moderate ... However, the use of look-up tables has restricted their usage in FIR.