Publication Type : Journal Article
Publisher : International Journal of Advances in Soft Computing and its Applications, International Center for Scientific Research and Studies
Source : International Journal of Advances in Soft Computing and its Applications, International Center for Scientific Research and Studies, Volume 9, Number 2, p.188-203 (2017)
Campus : Bengaluru
School : Department of Computer Science and Engineering, School of Engineering
Department : Computer Science
Year : 2017
Abstract : Data integrity is a crucial part of any secure system. Cryptographic hash functions serve as a basic building block of information security for ensuring data integrity and data origin authentication. They are used in numerous security applications such as digital signature schemes, construction of MAC and random number generation. A hash function takes an arbitrary amount of input and produces an output of fixed size. Many of the widely used cryptographic MD-5 and SHA-1 hash functions have been shown to be vulnerable to attacks. The non linear behavior of the neural network model which takes multiple inputs to produce single output makes it a perfect entrant for cryptographic hash design. The paper describes the construction of a cryptographic hash function using a multi layer Tree Parity Machine neural network. Although in our simulations we have considered 512 bit message blocks which generate 128 digit hash value, the proposed algorithm can be used flexibly to generate a hash function of arbitrary length. Simulations show that this hash function satisfies the security requirements of confusion, diffusion, and collision attack.
Cite this Research Publication : Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of secure Cryptographic hash function using soft computing techniques”, International Journal of Advances in Soft Computing and its Applications, vol. 9, pp. 188-203, 2017.