We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Message Digest System using Key Concept and Modulus Operations

by Suman Deb, Gautam Rakshit, Pritam Rakshit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 9
Year of Publication: 2013
Authors: Suman Deb, Gautam Rakshit, Pritam Rakshit
10.5120/13419-1094

Suman Deb, Gautam Rakshit, Pritam Rakshit . A Message Digest System using Key Concept and Modulus Operations. International Journal of Computer Applications. 77, 9 ( September 2013), 1-6. DOI=10.5120/13419-1094

@article{ 10.5120/13419-1094,
author = { Suman Deb, Gautam Rakshit, Pritam Rakshit },
title = { A Message Digest System using Key Concept and Modulus Operations },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 9 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number9/13419-1094/ },
doi = { 10.5120/13419-1094 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:47.430933+05:30
%A Suman Deb
%A Gautam Rakshit
%A Pritam Rakshit
%T A Message Digest System using Key Concept and Modulus Operations
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 9
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Message Digest is the promising methodology of data integrity in the concerned areas of computer communication. Different techniques of message digest are available and used for checking the data integrity and indirectly used in digital signatures for authentication of the transmitted information. Several research works are going on to make the computational process of message digest generation more complex to the unauthorized users. This paper introduces the procedure for generating message digest (Named as SGP-MD) using key in its algorithms so that the digest itself can directly act as a Message Authentication Code (MAC) and hence removing the need of separate encryption/decryption algorithm to create the MAC from the digest. The implementation of the proposed algorithm suffices for both data integrity and authentication purpose

References
  1. Atul Kahate: "Cryptography and Network security" Tata McGraw Hill Education Pvt. Ltd (2nd edition 2003).
  2. Stallings, W. : 'Cryptography and Network Security: Principles and Practice' (Prentice Hall Inc. , 2ndedn. 1999).
  3. Rivest,R. L. : 'The MD4 message-digest algorithm'. Proc. Crypto'90,LNCS 537, 1991, pp. 303-311
  4. NIST, "Secure Hash Standard," FIPS PUB 180, May. 1993.
  5. R. L. Rivest. : 'The MD5 Message Digest Algorithm'. RFC 1321, 1992.
  6. X. Wang, H. Yu and Y. L. Yin "Efficient Collision Search Attacks onSHA-0" eprint 2005 http://eprint. iacr. org/2005/391. pdf
  7. Federal Information Processing Standard (FIPS): 'Publication 180-1, Secure Hash Standard (SHS)', U. S. Doc/NIST, April 1995.
  8. Federal Information Processing Standard (FIPS): 'Publication 180-2, Secure Hash Standard (SHS)', U. S. Doc/NIST, May 2001.
  9. Integrity Primitives for Secure Information Systems: Final Rep. of RACE Integrity Primitives Eval. RIPE-RACE 1040, LNCS 1007, 1995Rump Session, Aug. 2004.
  10. Zheng,Y. , Pieprzyk, J. and Sebery,J. : 'HAVAL -A One-Way Hashing Algorithm with Variable Length of Output'. Proc. Auscrypt'92, LNCS 718, 1993, pp. 83-104.
  11. Abdul Hamid M. Ragab, Nabil A. Ismail, Senior Member IEEE, and Osama S. FaragAllah "An Efficient Message Digest Algorithm for Data Security".
  12. B. den Boer, A. Bosselaers, "An Attack on the Last Two Rounds of MD4," Advances in Cryptology, proc. Crypto'91, LNCS 876, J. Feigenbaum, Ed, Spriager-Verlag, 1992, pp. 194-203.
  13. H. Dobbertin,"Cryptanalysis of MD4,"Fast Software Encryption, LNCS 1039, D. Gollmann, Ed. , Springer- Verlag, 1996.
Index Terms

Computer Science
Information Sciences

Keywords

Data Authentication and Integrity Data security key stream Message Digest