Results 1 to 10 of about 339,422 (211)

Secure Hash Algorithm-2 formed on DNA [PDF]

open access: diamondJournal of the Egyptian Mathematical Society, 2019
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing.
Dieaa I. Nassr
doaj   +4 more sources

Count based Secured Hash Algorithm [PDF]

open access: bronzeIOSR Journal of Computer Engineering, 2012
This paper introduces a new approach to the Secured hash algorithm. The proposed algorithms takes the variable length input bit sequence and generate the fix length output as according to the algorithm. There are many constant values, used functions, pre-processing and hashing in SHA(1)(2)(3)(4). Here introducing new technique in which shifting of bits
Mayank Swarnkar
openalex   +2 more sources

A Secure Perceptual Hash Algorithm for Image Content Authentication [PDF]

open access: bronze, 2011
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection.
Li Weng, Bart Preneel
openalex   +5 more sources

On Information Integrity Measurement with Secure Hash Algorithm (SHA) [PDF]

open access: bronzeInSITE Conference, 2015
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most ...
Segun Adebisi Ojo   +3 more
openalex   +3 more sources

Performance and Limitation Review of Secure Hash Function Algorithm

open access: bronzeInternational Journal on Recent and Innovation Trends in Computing and Communication, 2019
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is expected to be a confined limit, that is, a limit which is infeasible to adjust.
Iti Malviya, Tejasvini Chetty
openalex   +3 more sources

Data De-Duplication Using SHA (Secure Hash Algorithm)

open access: goldInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data.
G. Kalyani, D.S.L. Neethika, Ch. Jayasri
openalex   +3 more sources

A secured Cryptographic Hashing Algorithm

open access: green, 2010
Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string.
Rakesh Mohanty   +2 more
openalex   +4 more sources

Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

open access: goldIEEE Access, 2018
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj   +2 more sources

A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256 [PDF]

open access: goldEntropy, 2018
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture
Shuqin Zhu, Congxu Zhu, Wenhong Wang
doaj   +2 more sources

Password Verification in Military Networks by using Secure Hash Algorithm

open access: goldIndian Journal of Science and Technology, 2016
Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they
Sai Ram Kiran Konduri   +3 more
openalex   +4 more sources

Home - About - Disclaimer - Privacy