• No results found

Secure Hash Algorithm

An Efficient Approach for Secure Hash Algorithm

An Efficient Approach for Secure Hash Algorithm

... Abstract— Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security ...famous secure hash algorithm ...

6

Secure Hash Algorithm-2 formed on DNA

Secure Hash Algorithm-2 formed on DNA

... Secure Hash Algorithm-2 (SHA-2) is a set of secure hash functions standardized by NIST as part of the Secure Hash Standard in FIPS 180-4 ...revised Secure ...

20

Title: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

Title: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

... A hash function takes a variable sized input message and produces a fixed-sized ...the hash code or the hash value or the message digest (Kak, 2014), hash functions play a significant role in ...

7

Data De Duplication Using SHA 
(Secure Hash Algorithm)

Data De Duplication Using SHA (Secure Hash Algorithm)

... of hash values of a different data blocks and security of ...(Secure Hash Algorithm) and AES. SHA is used as it is more secure than other hashing ...

5

Android Mobile Security using Secure Hash Algorithm

Android Mobile Security using Secure Hash Algorithm

... a hash function used in cryptography which can produce 160-bit hash ...SHA-1 algorithm is similar to SHA except it corrects error from ...the algorithm is not used by many ...popular ...

7

Implementation of Secure Hash Algorithm Using JAVA Programming

Implementation of Secure Hash Algorithm Using JAVA Programming

... when we talk about network , network based application and web based application or Web Services like SOAP(Simple object access protocol). Authentication of a user to learn his or her identity. The identity information ...

6

Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security

Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security

... As shown in Figure I, SHA-I processing of M(2) to M(n) takes the message digest of previous block and produces the seed or the final message digest, therefore they also share the same st[r] ...

6

Implementation of Secure Hash Algorithm1 for High Throughput and Optimized Performance

Implementation of Secure Hash Algorithm1 for High Throughput and Optimized Performance

... Generally, secure communication includes authentication, confidentiality, non-repudiation, and integrity of the ...cryptography hash algorithms plays a major role. In this thesis, Secure Hash ...

10

Secure digital signature schemes based on hash functions

Secure digital signature schemes based on hash functions

... cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) which was designed by the National Security Agency (NSA) and was published in 2001 by the NIST as a ...for Secure Hash ...four ...

5

An Implementation of MD5 Hash Algorithm for RFID Tags

An Implementation of MD5 Hash Algorithm for RFID Tags

... MD5 algorithm; the most important concern was to start this ...cryptographic hash function at current time. MD5 is the hash function designed by Ron Rivest as a strengthened version of MD4 ...used ...

7

Double-block  Hash-then-Sum:  A  Paradigm  for  Constructing  BBB  Secure  PRF

Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF

... BBB secure deterministic MAC, called SUM-ECBC, a rate-1/2 sequential mode of construction with four block cipher keys that offers roughly about 2n/3-bit ...BBB secure deterministic MAC, called 3kf9, a ...

57

HASH be a hash function.

HASH be a hash function.

... cryptographic hash functions, one of the most important classes of primitives used in recent techniques in ...Analysis hash function, mainly from SHA ...new hash function ...new hash function ...

6

A survey paper on Secure Hash Based Distributed De-duplication Systems

A survey paper on Secure Hash Based Distributed De-duplication Systems

... In this paper creators, display two provably-secure PDP plans that are more proficient than past arrangements, notwithstanding when contrasted and plans that accomplish weaker certifications. Specifically, the ...

5

Public Inspect For Secure Cloud Storage Based On Dynamic-Hash-Table

Public Inspect For Secure Cloud Storage Based On Dynamic-Hash-Table

... dimensional hash codes, for example, Latent semantic inadequate hashing (LSSH), discriminative coupled lexicon hashing (DCDH), Cross-see Hashing (CVH), et ...

7

For Secure Cloud Storage of dynamic-Hash-Table based On Public Auditing

For Secure Cloud Storage of dynamic-Hash-Table based On Public Auditing

... for secure distributed storage predicated on powerful hash table (DHT), which is a nascent two-dimensional information structure situated at a third equality examiner (TPA) to record the information ...

7

Design and Analysis of a New Hash Algorithm with Key Integration

Design and Analysis of a New Hash Algorithm with Key Integration

... different hash value even for the same input. We tested the algorithm on number of inputs, where input is fixed to a definite size (say 1000 ...different hash value each ...MD5 algorithm, ...

6

Secure data transaction in the cloud using Steganography and Merkle Hash Tree

Secure data transaction in the cloud using Steganography and Merkle Hash Tree

... Merkel Hash tree is used to split the data into many different parts with unique hash value assigned to each and every part of the data and it is also used to check whether the data which is present in the ...

6

Secure Cloud Storage By Dynamic-Hash-Table Based Public Auditing

Secure Cloud Storage By Dynamic-Hash-Table Based Public Auditing

... • F – the data file to be outsourced, denoted as a sequence of n blocks m1, . . . , mi , . . . , mn ∈ Zp for some large prime p. • MAC(·)(·) – message authentication code (MAC) function, defined as: K × {0, 1} ∗ → {0, 1} ...

6

Short and Secure CLS Pattern Using Simple Crypto Analysis Hash Technique

Short and Secure CLS Pattern Using Simple Crypto Analysis Hash Technique

... is secure against fully-adaptive chosen cipher text attack (IND-CCA) and also proposed certificateless digital signature scheme along with certificateless key agreement protocol and hierarchal certificateless ...

5

DRINA: A SECURE CLUSTERING ALGORITHM

DRINA: A SECURE CLUSTERING ALGORITHM

... for secure transmission of ...clustering algorithm was developed for wireless sensor network for data ...clustering algorithm, the security issues are not ...DRINA algorithm along with ...

8

Show all 10000 documents...

Related subjects