Muhammad Khalil Shahid

Work place: Department of Telecommunication Engineering,PTCL Institute of Communication Technologies, H-9, Islamabad, Pakistan

E-mail: khalil.shahid@ptcl.net.pk

Website:

Research Interests: Network Architecture, Network Security

Biography

Dr. Muhammad Khalil Shahid received the Bachelor and Master degree from University of Engineering & Technology Lahore and University of Engineering & Technology Taxila respectively. In 2008, he received the PhD degree from Beijing University of Posts & Telecommunications. Currently, he is working as Associate Professor in Institute of Communication Technologies PTCL Islamabad. His research interests include Optical and Wireless Communication, Communication Network Security and Telecom Regulations.

Author Articles
Enhancing Hash Function Selection Techniques Based on Message Contents

By Ali Saeed Muhammad Khalil Shahid

DOI: https://doi.org/10.5815/ijcnis.2012.01.06, Pub. Date: 8 Feb. 2012

In Hash based Security systems two major factors that are mostly relied upon are Strong Hash function and the selection procedure of the hash function from a given pool. This paper aims at exploiting maximum available resources a message possesses, intrinsically, that can accommodate greater number of hash functions references. It provides a simple, low cost- easy to implement technique that will be able to make systems available with random hash functions’ selection ability. With the given technique the security level will be enhanced along with greater availability of hash functions. The truly variable nature of contents of messages can be exploited in order to secure messages beyond measure. In case of a single communication stint, if one hash function is compromised the next hash function for next block will be selected truly randomly and cannot be predicted. A summary of already in use techniques is also discussed in order to prove the proposition distinct and practicable. In proposed technique it is proven that it has ability to accommodate greater number of hash functions. Further, the hash function selection methodology has been provisioned with a technique to be message-dependent; the security cannot be compromised owing to truly randomness of the selection procedure.

[...] Read more.
Other Articles