CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity

by Siddhartha Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 8
Year of Publication: 2015
Authors: Siddhartha Rao
10.5120/ijca2015907056

Siddhartha Rao . Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity. International Journal of Computer Applications. 130, 8 ( November 2015), 25-27. DOI=10.5120/ijca2015907056

@article{ 10.5120/ijca2015907056,
author = { Siddhartha Rao },
title = { Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 8 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number8/23231-2015907056/ },
doi = { 10.5120/ijca2015907056 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:51.856643+05:30
%A Siddhartha Rao
%T Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 8
%P 25-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until recently, SHA-1 was considered to be the most secure hashing algorithm and also remains the most widely used hashing function till date. In this paper, we review various collision search attacks on the original full 80-step SHA-1 algorithm and present a new optimized version of the algorithm that reduces the chance of collision and increases the theoretical lower bound of the time complexity required to detect such a collision by an exponential factor of 2.

References
  1. Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Crypto, 2005.
  2. SHA-1. Available online: http://en.wikipedia.org/wiki/SHA-1.
  3. Jeff Phreshing, http://preshing.com/20110504/hash-collision-probabilities/, 2011.
  4. Collision attack. Available online: http://en.wikipedia.org/wiki/Collision_attack.
  5. Mieliestronk's list of more than 58 000 English words: http://www.mieliestronk.com/wordlist.html.
  6. Dave Rockvam, SHA-2 Migration, Pt. 4, 2014.
  7. Bart Preneel, The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

SHA-1 SHA-0 Hash Functions Collision Search Attacks Improvements in SHA-1