CFP last date
16 December 2024
Reseach Article

Hybrid HMAC using improved SHA-512

Published on June 2014 by Pratik Kanani, Kamal Shah, Vikas Kaul, Bhushan Nemade
International Conference and workshop on Advanced Computing 2014
Foundation of Computer Science USA
ICWAC2014 - Number 2
June 2014
Authors: Pratik Kanani, Kamal Shah, Vikas Kaul, Bhushan Nemade
46ae8b76-64a8-4bea-aa62-3f2ea0afa080

Pratik Kanani, Kamal Shah, Vikas Kaul, Bhushan Nemade . Hybrid HMAC using improved SHA-512. International Conference and workshop on Advanced Computing 2014. ICWAC2014, 2 (June 2014), 0-0.

@article{
author = { Pratik Kanani, Kamal Shah, Vikas Kaul, Bhushan Nemade },
title = { Hybrid HMAC using improved SHA-512 },
journal = { International Conference and workshop on Advanced Computing 2014 },
issue_date = { June 2014 },
volume = { ICWAC2014 },
number = { 2 },
month = { June },
year = { 2014 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwac2014/number2/652-1437/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and workshop on Advanced Computing 2014
%A Pratik Kanani
%A Kamal Shah
%A Vikas Kaul
%A Bhushan Nemade
%T Hybrid HMAC using improved SHA-512
%J International Conference and workshop on Advanced Computing 2014
%@ 2249-0868
%V ICWAC2014
%N 2
%P 0-0
%D 2014
%I International Journal of Applied Information Systems
Abstract

With the fast progression of digital data exchange in electronic way, information security is becoming more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The confidentiality, Integrity and Availability are the three main goals of Information Security. To protect Confidentiality and Integrity of the message, key mechanisms and Hash functions are used. This paper proposes a novel scheme, which computes Hybrid HMAC based on improved SHA-512 algorithm. The proposed system gives a constant output of 512 bits for any input length of data and generates HMAC using multiple available keys. Paper also provides a method for reducing the time taken by traditional HMAC functions and increases complexity of SHA-512.

References
  1. Secure Hash Algorithm, Wikipedia (access on 10 January 2014) http://en. wikipedia. org/wiki/Secure_Hash_Algorithm
  2. William Stallings, Cryptography and Network Security : Principles and Practice , fifth Edition, Prentice hall.
  3. S. Gueron, S. Johnson and J. Walker, "SHA-512/256", IEEE Conference on IT:new Generations, pp. 354-358, 2011.
  4. BigDecimal and BigInteger, Stackoverflow (access on 20 January 2014) http://stackoverflow. com/search?q=bigdecimal+and+biginteger
  5. Java Optimization Rules, Appperfect (access on 22 January 2014) http://www. appperfect. com/support/java-coding-rules/optimization. html
  6. A. Mandal and A. Tiwari, "Analysis of Avalanche Effect in Plaintext of DES using Binary codes", International Journal of Emerging Trnds and Technology in Computer Science, vol. 1 , pp. 166-171, 2012.
  7. String Similarity test, Tools4noobs (access on 2 February 2014) http://www. tools4noobs. com/online_tools/String-similarity
Index Terms

Computer Science
Information Sciences

Keywords

HMAC SHA-512 Modified SHA-512 Avalanche effect Buffers.