Abstract
Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated in the area of information protection, helping to assure the validity of the information generated. These include the following algorithms: SHA-1, SHA-2, SHA-3, AES, RC5, RSA, and more. In order to secure the legitimacy of the information and monitoring data , the speed of encryption and authentication must be critical. . Due to the necessity of fast and secure algorithms, these features are required. In this work, modification of the SHA-3 algorithm by introducing a new function called (the keccak function), which has an extremely quick execution time and a high level of security, also versatile cryptographic function. This change is implemented via the 2D chaotic system, which is geared towards generating random values for constants for the SHA3 algorithm. These constants values are generated by the SHA3 algorithm, and so are random and unguessable by the intrude. Statistical tests conducted by the National Institute of Standards and Technology (NIST) effectively outperformed the randomness of a proposed approach .The proposed algorithm shows lower execution time compared to previous studies, which is 0.041616sec for 1MB. Index Terms — Cryptography, Hash function, keccak Function, SHA-3, Chaotic system.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have