High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Information Authentication Testing Using Message Digest Algorithm

Author(s):

Ekta P.Brahmbhatt , Sankalchand Patel college of Engineering,Visnagar; Prof.Hetal G.Bhatt, Sankalchand Patel college of Engineering,Visnagar

Keywords:

2D Logistic Map, SHA-512, Chaotic Map

Abstract

This paper proposes hash algorithms for the images A hash function is any function that can be used to map data of arbitrary size to data of fixed size. Hashes are used to secure the data and message integrity, password validity, and are the basis of many other cryptographic systems. Hashes are unique and it is one way function. It cannot be reversed. We use a SHA-512 algorithm and also try to reduce the brute force attack with the help of 2D logistic map method.SHA-512 is the most secure algorithm. Chaotic system has high sensitivities to its initial values, high sensitivities to its parameter(s), the mixing property and the ergodicity. Simulation results are shown.

Other Details

Paper ID: IJSRDV4I31499
Published in: Volume : 4, Issue : 3
Publication Date: 01/06/2016
Page(s): 1796-1798

Article Preview

Download Article