• No results found

hash algorithm

An Efficient Approach for Secure Hash Algorithm

An Efficient Approach for Secure Hash Algorithm

... Abstract— Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security ...secure hash algorithm given by the ...

6

Title: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

Title: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

... A hash function takes a variable sized input message and produces a fixed-sized ...the hash code or the hash value or the message digest (Kak, 2014), hash functions play a significant role in ...

7

Low Power Implementation of Modified Hash Algorithm in Asic

Low Power Implementation of Modified Hash Algorithm in Asic

... In this paper a new method is proposed for generating digital signature based on SHA- 512 hash algorithm. This method uses a secret key and enjoys the benefits of the private key cryptography. Two SHA-512 ...

7

Implementation of Secure Hash Algorithm Using JAVA Programming

Implementation of Secure Hash Algorithm Using JAVA Programming

... when we talk about network , network based application and web based application or Web Services like SOAP(Simple object access protocol). Authentication of a user to learn his or her identity. The identity information ...

6

Android Mobile Security using Secure Hash Algorithm

Android Mobile Security using Secure Hash Algorithm

... a hash function used in cryptography which can produce 160-bit hash ...SHA-1 algorithm is similar to SHA except it corrects error from ...the algorithm is not used by many ...popular ...

7

Adaptive Compressive Tracking Based on Perceptual Hash Algorithm

Adaptive Compressive Tracking Based on Perceptual Hash Algorithm

... tracking algorithm is easily failed to track target due to the classifier learning rate is fixed when appearances and lightings of target get seriously changed and completely loses the target after heavy ...

5

Data De Duplication Using SHA 
(Secure Hash Algorithm)

Data De Duplication Using SHA (Secure Hash Algorithm)

... unique hash value will be generated using hashing algorithms like SHA or ...a hash value will be generated foe that and it will be compared with the existing hash ...the hash value is not ...

5

Hash Algorithm for Finding Associations between Genes

Hash Algorithm for Finding Associations between Genes

... mining algorithm, PVARM(Partition based Validation for Association Rule Mining), NRRM (non-redundant rules method) and Hash Based with respect to various datasets like adult, genome, groceries and SER ...

10

SteGANOGRAPHIC and Watermarking Using Masking with Face Recognition by Using Hash Algorithm

SteGANOGRAPHIC and Watermarking Using Masking with Face Recognition by Using Hash Algorithm

... secure hash algorithm, techniques and its uses, it also merges a watermarking using ...steganography algorithm that briefly display that which steganography techniques are more suitable for which ...

5

Providing Security using Hash Algorithm for Chanel Aware Routing in MANET’S

Providing Security using Hash Algorithm for Chanel Aware Routing in MANET’S

... Abstract- A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. ...

5

Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm

Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm

... classic hash algorithm systems (MD5 and SHA-1), so that the collision to crack the hash algorithm has become possible ...SM3 hash algorithm as an en- cryption algorithm, ...

10

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

... In the above, k -1 is the multiplicative inverse of k, mod q; i.e., (k -1 k) mod q = 1 and 0 < k -1 < q. The value of SHA- 1(M) is a 160-bit string output by the Secure Hash Algorithm specified in ...

5

Low Power And Area Efficiency of SHA 1 and SHA 2 Hash Algorithm

Low Power And Area Efficiency of SHA 1 and SHA 2 Hash Algorithm

... Secure Hash Algorithm (SHA) is the most widely used Hash Function in the ...and hash output ...all Hash Functions, SHA outputs a fixed length digest of a message with arbitrary input ...

5

A Class of Non Invertible Matrices in GF(2) for Practical One Way Hash Algorithm

A Class of Non Invertible Matrices in GF(2) for Practical One Way Hash Algorithm

... In this paper we proposed a technique for generating non invertible matrices in GF(2) and one-way hash algorithm to generate hash value. The non invertible matrices are generated only by giving a ...

6

Secure Hash Algorithm-2 formed on DNA

Secure Hash Algorithm-2 formed on DNA

... and we have given nucleotide operations that mimic the bitwise operations used in SHA- 2. In particular, we have presented the DNA operations R ¯ k (α), L ¯ k (α), and S ¯ k (α) that used to mimic the bitwise operations ...

20

Design of New Hash Algorithm with Integration of Key based on the Review of Standard Hash Algorithms

Design of New Hash Algorithm with Integration of Key based on the Review of Standard Hash Algorithms

... This paper focuses on general observation of Hash Algorithms. It has been observed that SHA-512 is better than all other algorithms reviewed in this paper. SHA-512 is more secure in terms of pre-image, second ...

8

Finding  collisions  for  MD4  hash  algorithm  using  hybrid  algorithm

Finding collisions for MD4 hash algorithm using hybrid algorithm

... evolutionary algorithm and hill climbing. Hybridization of evolutionary algorithm and hill climbing is a well-known technique for improving solutions, but it isn’t applied to this domain (at least by ...

14

An Implementation of MD5 Hash Algorithm for RFID Tags

An Implementation of MD5 Hash Algorithm for RFID Tags

... MD5 algorithm; the most important concern was to start this ...cryptographic hash function at current time. MD5 is the hash function designed by Ron Rivest as a strengthened version of MD4 ...secure ...

7

Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security

Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security

... As shown in Figure I, SHA-I processing of M(2) to M(n) takes the message digest of previous block and produces the seed or the final message digest, therefore they also share the same st[r] ...

6

Improving the Security for In Vehicle CAN using Hash Algorithm

Improving the Security for In Vehicle CAN using Hash Algorithm

... AES algorithm. Finally we can compare the AES and MD5 algorithm, md5 is secure because it is a one way function, not easily get the original ...md5 algorithm is a bit state, it is divide into four ...

5

Show all 10000 documents...

Related subjects