TY - JOUR T1 - Ensure Integrity and Authenticity Using Extended Dynamic Chaotic Based Hash Function for Mobile Data Security AU - Madhuravani, B. AU - Murthy, D.S.R. JO - International Journal of Soft Computing VL - 12 IS - 3 SP - 142 EP - 147 PY - 2017 DA - 2001/08/19 SN - 1816-9503 DO - ijscomp.2017.142.147 UR - https://makhillpublications.co/view-article.php?doi=ijscomp.2017.142.147 KW - authentication KW -integrity KW -message digest KW -hash function KW -chaotic map KW -extends DC KW - KW -DCS AB - Today with the progression of web and innovation security of data has turned into the prime worry in versatile and online applications. Broad measure of research has been done since years to give secure and solid hash capacities for data trade. Chaos based hash capacities have picked up a considerable measure of fascination by the researchers because of its non-linearity, irregularity and unusual outcomes. Different chaos based hash capacities have been actualized in the previous decade to accomplish privacy, uprightness and confirmation. In any case, the majority of the conventional chaos based hash functions are processed in sequential approach with a single dimensional array which limits their execution speed and execution in the versatile figuring applications. To beat these issues a novel parallel chaos hashing model is proposed in this study. This model extends the traditional dynamic chaotic system as extended DCS and integrates with a hash function to generate an n-bit hash value. This model gives more security, high calculation speed; restrain memory assets and less calculation overhead in the standalone and mobile applications. ER -