There are some applications of military and e-commerce networks, where security of transmitted data on unfriendly environment requires more concern as compared to other design issues like power and energy consumption. Data alterations in above mentioned applications can lead to irreparable losses; so to avoid such losses, we have to maintain Data Integrity in the communication network. This paper presents a novel and reliable Hash algorithm which inherits the basic architecture of SHA-1. Performance of proposed technique is compared with existing techniques through statistical test suite for random numbers. Results reveal that the suggested technique is more effective in terms of randomness than the existing algorithms. The proposed technique, thus, finds its applicability in the sensitive data environment.
Read full abstract