Work place: Islamic University, Sudan
E-mail: m.fadl@outlook.com
Website:
Research Interests: Information-Theoretic Security, Network Security, Information Security, Hardware Security, Application Security
Biography
Mohamed Fadl Idris is working as information security specialist in private sector in UAE, he is master student in Umdurman Islamic university in sudan. His research area is cryptology, hash functions, and security protocols.
By Yousef Ali Al-Hammadi Mohamed Fadl Idris Fadl
DOI: https://doi.org/10.5815/ijmsc.2019.01.01, Pub. Date: 8 Jan. 2019
Hash functions algorithms also called message digest algorithms, compress a message input of an arbitrary length, and produce an output with a fixed length that is distributed randomly.
Several hash algorithms exist such as Md5 and SHA1. These algorithms verify data integrity and restrict unauthorized data modification. However, they experience some complexities, especially when implemented in bitcoin mining, and low computation devices, in particularly IoT devices. As a remedy, this paper suggests a new compression function that reduces the complexity of the hash function algorithms such as MD5 and SHA-1. Also, proves that we can obtain the same results which are achieved by the original compression function.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals