Ali Saeed

Work place: Department of Telecommunication Engineering, PTCL Institute of Communication Technologies, H-9, Islamabad, Pakistan

E-mail: alisaeed01@yahoo.com

Website:

Research Interests: Computer Networks

Biography

Ali Saeed Received Bachelor degree from University of Engineering and Technology Peshawar, Pakistan in 2007. He is currently pursuing his Masters in telecommunication engineering at PTCL Institute of Communication Technologies, Islamabad, Pakistan. His experience chiefly relates to Next Generation Networks, where he has been in technical management of C5-NGN deployment and commission in Pakistan. His research interests are communication networks.

Author Articles
Enhancing Hash Function Selection Techniques Based on Message Contents

By Ali Saeed Muhammad Khalil Shahid

DOI: https://doi.org/10.5815/ijcnis.2012.01.06, Pub. Date: 8 Feb. 2012

In Hash based Security systems two major factors that are mostly relied upon are Strong Hash function and the selection procedure of the hash function from a given pool. This paper aims at exploiting maximum available resources a message possesses, intrinsically, that can accommodate greater number of hash functions references. It provides a simple, low cost- easy to implement technique that will be able to make systems available with random hash functions’ selection ability. With the given technique the security level will be enhanced along with greater availability of hash functions. The truly variable nature of contents of messages can be exploited in order to secure messages beyond measure. In case of a single communication stint, if one hash function is compromised the next hash function for next block will be selected truly randomly and cannot be predicted. A summary of already in use techniques is also discussed in order to prove the proposition distinct and practicable. In proposed technique it is proven that it has ability to accommodate greater number of hash functions. Further, the hash function selection methodology has been provisioned with a technique to be message-dependent; the security cannot be compromised owing to truly randomness of the selection procedure.

[...] Read more.
Other Articles