Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Design of Hash Algorithm for Blockchain Security

Design of Hash Algorithm for Blockchain Security
View Sample PDF
Author(s): Yatri Davda (Marwadi University, India)
Copyright: 2023
Pages: 18
Source title: Blockchain Applications in Cryptocurrency for Technological Evolution
Source Author(s)/Editor(s): Atour Taghipour (Normandy University, France)
DOI: 10.4018/978-1-6684-6247-8.ch007


View Design of Hash Algorithm for Blockchain Security on the publisher's website for pricing and purchasing information.


Blockchain is the invention that permits digitally generated information to be allocated without being copied. Blockchain technology is the heart of the new internet (i.e., virtual currency). Emerging clever settlement structures over decentralized cryptocurrencies permit jointly suspicious events to transact competently without relying on third parties (i.e., the reason to provide wide security to blockchain technology). Cryptography has so many algorithms to provide security such as MD5, AES, RSA, SHA family, etc. Hash functions are extremely useful and appear in almost all information security applications, so hashing techniques are more secure among them. The authors are designing a new approach (i.e., SHA-512) in a local blockchain application. SHA-512 is a very secure algorithm that uses 64-bit words and operates on 1024-bit blocks. They are proving that SHA-512 is more collision-resistant than its predecessor with a few mathematical models.

Related Content

Dina Darwish. © 2024. 28 pages.
Dina Darwish. © 2024. 28 pages.
Muhammad Ahmed, Adnan Ahmad, Furkh Zeshan, Hamid Turab. © 2024. 33 pages.
Pankaj Bhambri. © 2024. 17 pages.
Kaushikkumar Patel. © 2024. 20 pages.
Vijaya Kittu Manda, Arnold Mashud Abukari, Vivek Gupta, Madavarapu Jhansi Bharathi. © 2024. 24 pages.
Pankaj Bhambri. © 2024. 17 pages.
Body Bottom