Publication Type:

Journal Article


International Journal of Advances in Soft Computing and its Applications, International Center for Scientific Research and Studies, Volume 9, Number 2, p.188-203 (2017)



<p>Data integrity is a crucial part of any secure system. Cryptographic hash functions serve as a basic building block of information security for ensuring data integrity and data origin authentication. They are used in numerous security applications such as digital signature schemes, construction of MAC and random number generation. A hash function takes an arbitrary amount of input and produces an output of fixed size. Many of the widely used cryptographic MD-5 and SHA-1 hash functions have been shown to be vulnerable to attacks. The non linear behavior of the neural network model which takes multiple inputs to produce single output makes it a perfect entrant for cryptographic hash design. The paper describes the construction of a cryptographic hash function using a multi layer Tree Parity Machine neural network. Although in our simulations we have considered 512 bit message blocks which generate 128 digit hash value, the proposed algorithm can be used flexibly to generate a hash function of arbitrary length. Simulations show that this hash function satisfies the security requirements of confusion, diffusion, and collision attack.</p>


cited By 0

Cite this Research Publication

Dr. S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of secure Cryptographic hash function using soft computing techniques”, International Journal of Advances in Soft Computing and its Applications, vol. 9, pp. 188-203, 2017.