Download PDFOpen PDF in browserDesign of Hash Algorithm for Blockchain SecurityEasyChair Preprint 76897 pages•Date: April 2, 2022AbstractBlockchain is the invention that permits digitally generated information to be allocated without being copied. Blockchain Technology is that the heart of the new internet i.e., virtual currency. Emerging clever settlement structures over decentralized cryptocurrencies permit jointly suspicious events to transact competently without relying on a third party, i.e., the reason to provide wide security to BlockChain Technology. Cryptography has so many algorithms to provide security such as MD5, AES, RSA, SHA family, etc. Hash functions are extremely useful and appear in almost all information security applications so, hashing techniques are more secure among them. We are designing a new approach i.e., SHA-512 in local blockchain applications. SHA-512 is a very secure algorithm that uses 64-bit words and operates on 1024-bit blocks. We are proving that SHA- 512 is more collision-resistant than its predecessor with few mathematical models. Keyphrases: Blockchain, Cryptocurrencies, Reliability, SHA-512, Timestamp
|