Information Authentication Testing Using Message Digest Algorithm |
Author(s): |
Ekta P.Brahmbhatt , Sankalchand Patel college of Engineering,Visnagar; Prof.Hetal G.Bhatt, Sankalchand Patel college of Engineering,Visnagar |
Keywords: |
2D Logistic Map, SHA-512, Chaotic Map |
Abstract |
This paper proposes hash algorithms for the images A hash function is any function that can be used to map data of arbitrary size to data of fixed size. Hashes are used to secure the data and message integrity, password validity, and are the basis of many other cryptographic systems. Hashes are unique and it is one way function. It cannot be reversed. We use a SHA-512 algorithm and also try to reduce the brute force attack with the help of 2D logistic map method.SHA-512 is the most secure algorithm. Chaotic system has high sensitivities to its initial values, high sensitivities to its parameter(s), the mixing property and the ergodicity. Simulation results are shown. |
Other Details |
Paper ID: IJSRDV4I31499 Published in: Volume : 4, Issue : 3 Publication Date: 01/06/2016 Page(s): 1796-1798 |
Article Preview |
|
|