Affiliation:
1. Marwadi University, India
Abstract
Blockchain is the invention that permits digitally generated information to be allocated without being copied. Blockchain technology is the heart of the new internet (i.e., virtual currency). Emerging clever settlement structures over decentralized cryptocurrencies permit jointly suspicious events to transact competently without relying on third parties (i.e., the reason to provide wide security to blockchain technology). Cryptography has so many algorithms to provide security such as MD5, AES, RSA, SHA family, etc. Hash functions are extremely useful and appear in almost all information security applications, so hashing techniques are more secure among them. The authors are designing a new approach (i.e., SHA-512) in a local blockchain application. SHA-512 is a very secure algorithm that uses 64-bit words and operates on 1024-bit blocks. They are proving that SHA-512 is more collision-resistant than its predecessor with a few mathematical models.
Reference36 articles.
1. Cryptographic hash function: A high level view.;A. A.Alkandari;2013 International Conference on Informatics and Creative Multimedia,2013
2. Ao, W., Fu, S., Zhang, C., Huang, Y., & Xia, F. (2019, August). A secure identity authentication scheme based on blockchain and identity-based cryptography. In 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET) (pp. 90-95). IEEE.
3. College fees transaction using hash functions of blockchain model.;R.Aswini;2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN),2019
4. RISPP: A run-time adaptive reconfigurable embedded processor.;L.Bauer;2009 International Conference on Field Programmable Logic and Applications,2009
5. Analysis of Cryptographic Hash in Blockchain for Bitcoin Mining Process.;P.Bhulania;2018 International Conference on Advances in Computing and Communication Engineering (ICACCE),2018