Results 1 to 10 of about 339,422 (211)
Secure Hash Algorithm-2 formed on DNA [PDF]
We present a new version of the Secure Hash Algorithm-2 (SHA-2) formed on artificial sequences of deoxyribonucleic acid (DNA). This article is the first attempt to present the implementation of SHA-2 using DNA data processing.
Dieaa I. Nassr
doaj +4 more sources
Count based Secured Hash Algorithm [PDF]
This paper introduces a new approach to the Secured hash algorithm. The proposed algorithms takes the variable length input bit sequence and generate the fix length output as according to the algorithm. There are many constant values, used functions, pre-processing and hashing in SHA(1)(2)(3)(4). Here introducing new technique in which shifting of bits
Mayank Swarnkar
openalex +2 more sources
A Secure Perceptual Hash Algorithm for Image Content Authentication [PDF]
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection.
Li Weng, Bart Preneel
openalex +5 more sources
On Information Integrity Measurement with Secure Hash Algorithm (SHA) [PDF]
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most ...
Segun Adebisi Ojo+3 more
openalex +3 more sources
Performance and Limitation Review of Secure Hash Function Algorithm
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is expected to be a confined limit, that is, a limit which is infeasible to adjust.
Iti Malviya, Tejasvini Chetty
openalex +3 more sources
Data De-Duplication Using SHA (Secure Hash Algorithm)
Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data.
G. Kalyani, D.S.L. Neethika, Ch. Jayasri
openalex +3 more sources
A secured Cryptographic Hashing Algorithm
Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string.
Rakesh Mohanty+2 more
openalex +4 more sources
Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3
Embedded multi-core systems are implemented as systems-on-chip that rely on packet storeand-forward networks-on-chip for communications. These systems do not use buses or global clock.
Ali Alzahrani, Fayez Gebali
doaj +2 more sources
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256 [PDF]
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture
Shuqin Zhu, Congxu Zhu, Wenhong Wang
doaj +2 more sources
Password Verification in Military Networks by using Secure Hash Algorithm
Objectives: The main objective is to provide security for confidential information by exploiting external storage nodes applications for mobile nodes in military environments by using secure hash algorithm. Methods and analysis: In military environments we are having measure partitions like a parcel or a hostile region. There is no doubt at all they
Sai Ram Kiran Konduri+3 more
openalex +4 more sources