INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 02, FEBRUARY 2020 ISSN 2277-8616 4629 IJSTR©2020 www.ijstr.org Xtings -160: A Strong Diffusion Property Novel Hashing Algorithm Christine Charmaine G. San Jose Abstract: This paper proposed for a novel hash algorithm called XTINGS - 160 Hash. Existing hash algorithm that is commonly used such as MD5 and SHA-1 are no longer safe to use and is vulnerable to brute force attacks. The proposed novel hash algorithm produces a 160-bit message digest having six rounds of calculation on the right half 64 bit of plaintext. The paper also illustrates how the final design of algorithm was achieved. The first two designs produce an 80 bit message digest and had contributed into attaining the XTINGS Hash algorithm which is the final design. Findings revealed that the Novel Hash Algorithm was able to meet the avalanche effect minimum expected rate of 50% in just six rounds. The novel hash algorithm is showing significant result that displays the characteristic of cryptographic property of diffusion with a robust hash function. Index Terms: Avalanche Effect, Cryptography, Diffusion, Hash Algorithm, Message Digest, Padding, Parsing . —————————— —————————— 1 INTRODUCTION rom the advent of internet and e-commerce usage, reports on breaching of security had continuously increased. Identity theft is a crime from which attackers may obtain important information of someone such as social security, driver’s license and others that eventually lead to impersonate and gain access to someone’s account. Statistics shows that there are about an increase of 12% cases for Identity theft in US in 2009 and an increase of 12.5% on annual fraud amounting to $54 Billion [1]. At present, username and password are commonly used by many as a log-in process on protected application such as logging into accounts, accessing applications web sites and many others. In information security, password is a critical component; it is for this reason that a password standard was created. This standard identifies the characteristics of strong and weak passwords [2]. Previous studies have shown [3] that most respondents supply password consist of only alphabetic characteristics and password derived from personal details, use of short password and is seldom changed. It was also stated [2] that the following characteristics falls on a weak or poor password: a password that contains eight characters or less, it contains personal information such as birthdays, address, phone numbers or names and others, a password that contains number patterns such as ―aaabbb‖, ―qwerty‖, ―zyxwvuts‖, ―123321‖, ―welcome123‖, ―password123‖ among others. These characteristics of password are weak and are prone from possible attacks. Moreover, the characteristic of a strong password should consist of at least fifteen alphanumeric value, contains both uppercase and lowercase characters, contains numbers and symbols, and is not based on personal information. The standard set in supplying strong password is very challenging because human memory is limited. It was observed that strong password such as "Xa&2#iCj1%s" can be very difficult and affects the password memorability. On the study of [1], it analyses ID-password usage and new log-in vulnerability measures. It was found out that those vulnerability credentials of internet users were explained using cybernetic theory and cognitive psychology theory. In the cognitive psychology theory implies that people may be able to remember a few unique identification and password without difficulty but has a great trouble in remembering them when the number of combinations increases. Moreover, attackers crack password using password-cracking software [4]. For seven characters, the software can try alphanumeric in 5.5 hours, every alphanumeric password with common symbols in 45 hours and every possible keyboard password in 480 hours. The storing of password in plain text or in readable form allows attacker to easily break-in into any account. To solve this issue, a security strategy can be adopted with the use of cryptographic hash function on stored password. Cryptography was defined as the study of mathematical techniques into the aspects of Information Security [5]. Cryptography used hash function as a technology which can be implemented to solve increasing security issues [6]. Hash Function has a one-way property making it difficult for a ciphertext to invert. It involves mathematical calculation that takes any plaintext or message as input, performs several processes such padding, bits calculation (xoring, adding and multiplying) several permutations, concatenation, bits shifting and many others, and produces fixed size alphanumeric value. Hash algorithm is being applied into many applications such as digital signature, message authentication, data integrity and key derivation [6, 7] Hashing algorithms such as MD5 (Message Digest 5) by Ronald Rivest of Massachusetts Institute of Technology (MIT) in 1991 and SHA1 (Secure Hash Algorithm 1) of National Institute of Standard and Technology (NIST) in 1993 are the commonly used cryptographic protocols and Internet communications. In the past years, studies have shown that these hashing algorithm were no longer safe and is vulnerable to brute force attack [5, 8]. The continued modification, improvement and even creation of new cryptographic hash function has been advised by information security professionals that is resilient to the number of attacks [8]. This paper is geared towards proposing a new hash algorithm called XTINGS Hash algorithm, simulate its mathematical calculation, compare and evaluate to famous hash algorithm in terms of cryptographic security property. 2 RELATED LITERATURE There were several hash algorithms that was developed: Series of Message Digest (MD2, MD4, MD5, MD6), Series of Secure Hash Algorithms (SHA0, SHA1, SHA2, SHA3), Des- Like Message Digest Computation (DMDC), and Keyed- hashing Message Authentication Code (HMAC) [6]. The famous among these hash algorithms are MD5 and SHA1. The MD5 Operation produced a 128 bit which is computed as follows: 1) Padding of message into 152 bit, 2) Initialization of MD Buffer, 3) Calculation of Four Auxiliary Function (F,G,H and I) and 4) Calculation of FF,GG,HH and II. To obtain the value of a, the following calculation is performed: The value of initialized MD buffer for b,c and d is calculated using formula F