Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

Secure and Efficient Integrity Algorithm based on Existing SHA Algorithms

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 113 - Number 11
Year of Publication: 2015
Snigdha Soni
Sandeep Pratap Singh

Snigdha Soni and Sandeep Pratap Singh. Article: Secure and Efficient Integrity Algorithm based on Existing SHA Algorithms. International Journal of Computer Applications 113(11):34-37, March 2015. Full text available. BibTeX

	author = {Snigdha Soni and Sandeep Pratap Singh},
	title = {Article: Secure and Efficient Integrity Algorithm based on Existing SHA Algorithms},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {113},
	number = {11},
	pages = {34-37},
	month = {March},
	note = {Full text available}


In today's world every person relies on internet for various purposes. There is always a need to take appropriate measures for getting secure communication all the way throughout this unsecure internet. Integrity is one of the most significant factors in the communication scenario. There are various algorithms that ensure the integrity but almost all are either not secure or not efficient. This paper highlights some of such algorithms and also introduces an integrity algorithm and also proves its efficiency with its implementation result.


  • Garbita Gupta and Sanjay Sharma, "Enhanced SHA-192 Algorithm with Larger Bit Difference" IEEE International Conference on Communication Systems and Network Technologies, 2013
  • L. Thulasimani and M. Madheswaran "Security and Robustness Enhancement of Existing Hash Algorithm" IEEE International Conference on Signal Processing Systems 2009.
  • A new Hash Function Based on Combination of Existing Digest Algorithms pub 2007.
  • The Collision Rate Tests of Two Known Message Digest Algorithms 2009.
  • Harshvardhan Tiwari. A Secure Hash Function MD-192 with Modified Message Expansion" Vol. 7 No. 2 February 2010 International Journal of Computer Science and Information Security.
  • Marc Stevens hash clash - Framework for MD5 & SHA-1 Differential Path Construction and Chosen-Prefix Collisions for MD5
  • X. Wang, H. Yu and Y. L. Yin, "Efficient Collision Search Attacks on SHA-0",(Pub 2005)
  • K. Matusiewicz and J. Pieprzyk, "Finding good differential patterns attacks on SHA-1", (Pub 2004), Available: http://eprint. iacr. org/2004/364. pdf
  • William Stallings, "Cryptography and Network Security: Principles and Practice. Third edition, Prentice Hall. 2003.
  • Florent Chabaud, Antoine Joux, "Differential collisions in SHA-0," Advances in Cryptology-CRYPTO'98, LNCS 1462, Springer-Verlag, 1998.
  • http://en. wikipedia. org/wiki/Secure_Hash_Algorithm
  • Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, and Stamatis Vassiliadis " Cost-Efficient SHA Hardware Accelerators" IEEE transactions on very large scale integration (VLSI)Systems, VOL. 16, NO. 8, AUGUST 2008