The integrity violation of remote data draws more significance after the advent of cloud solutions. The conventional digest functions like MD4, MD5, SHA-160, SHA-2 family, and SHA-3 family provide a more elegant solution for the aforesaid problem. But the breaking of MD4, MD5, and SHA-160 algorithms and the partisal breaking of the families of SHA-2 and SHA-3 raises concerns about their use on cryptographic applications. In addition, they do not provide the facility to decide the hash output length dynamically at runtime. This work attempts to address the aforesaid problems through polynomial products. The proposed design uses a higher-order two-variables polynomial function to establish the hash output. The application of polynomial function at the block-level helps the proposed design to produce variable length hash output. The experimental analysis of avalanche response, the effect of an avalanche on the hash output nibbles, and the analysis of confusion and diffusion prove the proposed design performs exceedingly well than the conventional algorithms. Therefore, the proposed design could be considered as a more suitable alternative for the conventional keyless digest function in the perspective of security.
Index Terms: Data Integrity confirmation through polynomial function, Dynamic digest function, Enhancing the avalanche effect through polynomial function, One-way dynamic digest function, Polynomial function for message authentication. He is doing his research in the domainof data Security and in particular devising a new Keyless Hash Functions using MDC. He is also actively involved in designing polymorphic symmetric encryption algorithms to address issues related with all encryption attacks including Brute force. The other areas of interest includes network security, information security, design of encryption algorithms and writing Multi-agent based applications for network problems .Dr.SHANTHI BALA is working as assistant professor in the department of Computer science, School of Engineering and Technology, Pondicherry University, Puducherry. She has published more than 25 papers in reputed journals and right now she is guiding 4 research scholars in the domain of Data mining , Network Security and Data security. She has published several papers in various national and international conferences. She has been actively involved in the design of new hash algorithms for issues related with integrity breaches on remote data. She is also involved in designing new encryption algorithm for providing strong resistance to all forms of crypto attacks. The other area of interest includes Knowledge Engineering, Cloud Computing and Internet of Things.