High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Review Study of Different Methods of Secure Hashing Algorithm using in Image Encryption Advantages

Author(s):

Ruchi Tiwari , GGITS jabalpur; Prof. Rajender Singh Yadav, GGITS jabalpur

Keywords:

AES-Advance encryption System, SHA-Secure Hash Algorithm, NPCR-Number of Pixels Change Rate, UACI-unified averaged changed intensity

Abstract

Our approach is to propose a fast and secure scheme for digital image encryption using only two-diffusion process based on nested chaotic attractor and the Secure Hash Algorithm SHA-1 to generate a secret key. The main advantages of our chaotic sequence used are the efficiency, simplicity and rapidity, all these features are very important it can be implemented on embedded systems. The paper work is a new approach in the hashing area, which use a modified SHA-1 image Encryption/ hashing with modifier round proposed design has come up with idea of using 40 rounds instead of 80 round of SHA-1, that will increase the speed of hash generation for achieving that proposed work simply modified the single compression/iteration operation. The results of security analysis such as statistical tests, differential attacks, key space, key sensitivity, entropy information and the running time are illustrated and compared to recent encryption schemes where the highest security level and speed are improved.

Other Details

Paper ID: IJSRDV7I100294
Published in: Volume : 7, Issue : 10
Publication Date: 01/01/2020
Page(s): 464-467

Article Preview

Download Article