Ensuring Data Integrity Using Secure Hash Algorithm SHA-512_Group3
Ensuring Data Integrity Using Secure Hash Algorithm SHA-512_Group3
Algorithm SHA-512
Ho Chandara1, Horn Bunhak2, Men Rithydet3, Sot Sochetra4, Seak Chhaynee5, Reth Monypong6, Yoeung Sokheng7
2nd bridge Prek Leap, National Road Number 6, Phnom Penh, Cambodia
[email protected], [email protected]
[email protected], [email protected]
[email protected], [email protected]
Abstract— This research examines how the Secure Hash has become a cornerstone of cybersecurity with its various
Algorithm (SHA-512) helps protect digital data from tampering iterations like (SHA-1, SHA-2, SHA-3) ensuring data
and corruption. We implemented SHA-512 in Python and tested integrity across diverse applications, including digital
its ability to detect unauthorized changes in different types of signatures, blockchain technology, and secure
files, including text, images, and audio. Our experiments show communications [4].
that SHA-512 creates unique digital fingerprints for each file,
and even the smallest change to the original data results in a So, the remainder of this paper dives into the principles
completely different fingerprint. This makes it highly effective underlying the Secure Hash Algorithm 512, to examine its
at detecting any modifications to digital content. The results variant and applications, and evaluates its effectiveness in
confirm that SHA-512 is a reliable tool for ensuring data maintaining data integrity in today’s digital landscape.
remains unchanged during storage and transmission, making it
valuable for applications like secure file sharing, digital LITERATURE REVIEW
signatures, and database security. This research provides In the subject of cybersecurity, especially in the field of
practical evidence of SHA-512's effectiveness in maintaining
information security, maintaining data integrity has long been
data integrity across various digital systems.
a concern, and scholars have repeatedly emphasized how
Keywords—Data Integrity, Data Security, Secure Hash crucial it is to contemporary digital ecosystems. Several
Algorithm, Hash, Cryptography, Message Padding, studies highlight the dangers of cyberattacks, data corruption
and data tampering. Smith et al. [5] emphasize that data
INTRODUCTION integrity is a pivotal aspect of clinical trials, influencing
research credibility and data breaches can have profound
In Today’s Digital Landscape, Ensuring the integrity of financial and reputational consequences, especially for
data is a critical component of modern information security organizations that is operating in high-stakes industries such
practices. In an era marked by increasing cyber threats and the as finance and healthcare. Ravi Kumar Sharma [6] also points
proliferation of digital data, safeguarding the authenticity and out that poor data quality and integrity problems are often
consistency of data during transmission and become a top overlooked until they cause significant losses, which
priority. So that bad and unreliable data cannot potentially exacerbates the issues even more.
cause companies millions of dollars in revenue loss and have
far reaching consequence beyond financial damage for the Ensuring data integrity is a cornerstone of modern
party involved [1]. According to a survey conducted by the information security, with cryptographic hash functions
research firm Gartner, organizations believe to have poor data playing a pivotal role in detecting tampering and verifying
quality is to be responsible for an average of 15 million dollars authenticity. Among these The Secure Hash Algorithm (SHA)
per years in losses, In the same study Gartner also found that family has been extensively studied for its reliability and
nearly 60% of those surveyed did not know how much bad robustness. While earlier versions like SHA-1 and SHA-2
data is costing their business because they don’t measure them have proven effective, advancements in computational power
in the first place [2]. and cyber threats have driven the adoption of stronger
algorithms such as SHA-512 [7][12].
However, ensuring data integrity is no easy task. Data in
transit and storage usually faces numerous challenges and SHA-512 is distinguished by its 512-bit hash output and
threats, including unauthorized tampering, accidental higher resilience to collision and preimage attacks, making it
corruption, and even deliberate cyberattacks. As data grows in particularly well-suited for scenarios demanding enhanced
volume and complexity, so does the challenge of safeguarding data security. The advantage of using SHA-512 instead of the
its authenticity. Traditional methods of error detection often other iteration is because of its longer hash length and
fall short in addressing the sophisticated threats and computational robustness as key factors [8].
challenges that are posed by modern cybercriminals [3]. In the subject of cryptographic hashing, there has been a
This is where cryptographic hash functions, such as the lot of interest in the process of hashing files with multiple
Secure Hash Algorithm (SHA), come into play. These parameters, such as different block sizes, input lengths, and
algorithms create a unique digital footprint, or hash value, of salting approaches. The effect of parameter adjustment on
the original input. Even the smallest change in the input data hash function performance is examined in studies by Harris E.
results in a completely different hash value, making any Michail, George Athanasiou [9], especially through the use of
tampering or modifying of data immediately detectable. SHA pipelined designs. According to their research, the area-