Document Type : Research Paper


1 computer science/university technology/Iraq/Baghdad

2 computer science,Technology University,Iraq,Baghdad


Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated in the area of information protection, helping to assure the validity of the information generated. These include the following algorithms: SHA-1, SHA-2, SHA-3, AES, RC5, RSA, and more. In order to secure the legitimacy of the information and monitoring data , the speed of encryption and authentication must be critical. . Due to the necessity of fast and secure algorithms, these features are required. In this work, modification of the SHA-3 algorithm by introducing a new function called (the keccak function), which has an extremely quick execution time and a high level of security, also versatile cryptographic function. This change is implemented via the 2D chaotic system, which is geared towards generating random values for constants for the SHA3 algorithm. These constants values are generated by the SHA3 algorithm, and so are random and unguessable by the intrude. Statistical tests conducted by the National Institute of Standards and Technology (NIST) effectively outperformed the randomness of a proposed approach .The proposed algorithm shows lower execution time compared to previous studies, which is 0.041616sec for 1MB.


Main Subjects