OPTIMIZING CRYPTOGRAPHIC HASH FUNCTION PERFORMANCE THROUGH AN EXTENDED SECURE HASH ALGORITHM (2080-BIT VARIANT)
Abstract
Cryptographic hash functions are fundamental to ensuring data integrity, authentication, and security in digital systems. This paper introduces and evaluates an extended 2080-bit variant of the Secure Hash Algorithm, designed to enhance resistance against collision, preimage, and length-extension attacks while maintaining computational efficiency. The proposed algorithm incorporates dynamic message expansion, multi-stage compression, and parallel processing techniques to optimize performance across diverse hardware architectures. Benchmarking results reveal that the 2080-bit variant outperforms conventional SHA families in both throughput and cryptographic strength, making it suitable for high-security applications such as blockchain, digital forensics, and secure communications. This study advances the development of robust, scalable hash functions for future-proof security systems.
Keywords
References
Similar Articles
- Dr. Evelyn R. Chen, Dr. Adrian M. Vella, A Comprehensive Taxonomy and Critical Survey of Scientific Workflow Scheduling Paradigms in IaaS Cloud Computing: Evaluating Fitness for High-Stakes Environmental Modeling , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Elena M. Kovacs, Predictive Intelligence Across Physical and Financial Systems: A Comparative Research Framework for Packed-Bed Thermal Energy Storage and AI-Driven Forecasting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 03 (2026): Volume 03 Issue 03
- Dr. Claire Whitman, LEVERAGING CYBER THREAT INTELLIGENCE MINING FOR ENHANCED PROACTIVE CYBERSECURITY: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Laura Stein, ADVANCING PROACTIVE CYBERSECURITY THROUGH CYBER THREAT INTELLIGENCE MINING: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Dr. Dmitry V. Sokolov, Synergizing Generative AI and Explainable Machine Learning in Security Operations Centers: Mitigating Alert Fatigue and Enhancing Analyst Performance , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- John M. Callahan, Advancing Cyber Threat Intelligence Frameworks: Integrative Models, Sharing Mechanisms, and Predictive Analytics , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 07 (2025): Volume 02 Issue 07
- Dr. Mateo Alvarez-Ruiz, From Reactive to Predictive Security: Integrating Threat Intelligence with SIEM for Proactive Threat Hunting , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Dr. Julian R. Cortez, A Comparative Analysis of Image Encryption Techniques Based on Linear Feedback Shift Registers and Chaotic Systems , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 3 No. 05 (2026): Volume 03 Issue 05
- Dr. Elena Petrova, Dr. Hassan Al-Mansoori, EVALUATING AND ENHANCING CYBERSECURITY AND RESILIENCE IN HEALTHCARE: A UNIFIED RISK AND COMPLIANCE FRAMEWORK , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 05 (2025): Volume 02 Issue 05
- Dr. Layla Hassan, Reem Al-Mazrouei, EVOLVING PARADIGMS AND FUTURE TRAJECTORIES IN CYBER THREAT INTELLIGENCE , International Journal of Cyber Threat Intelligence and Secure Networking: Vol. 2 No. 06 (2025): Volume 02 Issue 06
You may also start an advanced similarity search for this article.