On Information Integrity Measurement with Secure Hash Algorithm (SHA) [PDF]
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most ...
Segun Adebisi Ojo+3 more
openalex +3 more sources
Performance and Limitation Review of Secure Hash Function Algorithm
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is expected to be a confined limit, that is, a limit which is infeasible to adjust.
Iti Malviya, Tejasvini Chetty
openalex +3 more sources
Implementasi Secure Hash Algorithm-1 Untuk Pengamanan Data Dalam Library Pada Pemrograman Java
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi
Komang Aryasa, Yesaya Tommy Paulus
openalex +3 more sources
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim+6 more
doaj +2 more sources
Data De-Duplication Using SHA (Secure Hash Algorithm)
Now-a-days the number of users using cloud storage has increased so that the data stored has been increased in exponential rates. The data should be secured and the storage should be used efficiently. But a lot of duplicate data is present as two or more users may upload the same data.
G. Kalyani, D.S.L. Neethika, Ch. Jayasri
openalex +3 more sources
A secured Cryptographic Hashing Algorithm
Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string.
Rakesh Mohanty+2 more
openalex +4 more sources
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection [PDF]
An adversary who has obtained the cryptographic hash of a user's password can mount an offline attack to crack the password by comparing this hash value with the cryptographic hashes of likely password guesses. This offline attacker is limited only by the resources he is willing to invest to crack the password.
Jeremiah Blocki, Anupam Datta
openaire +5 more sources
Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications [PDF]
Data integrity is a term used when referring to the accuracy and reliability of data. It ensures that data is not altered during operations, such as transfer, storage, or retrieval.
Muzaffar Rao, Thomas Newe, Ian Grout
openalex +2 more sources
Design and Implementation of a Strong and Secure Lightweight Cryptographic Hash Algorithm using Elliptic Curve Concept: SSLHA-160 [PDF]
Cryptographic hash function assumes a fundamental job in numerous pieces of cryptographic algorithm and conventions, particularly in authentication, non-repudiation and information trustworthiness administrations.
Bhaskar Prakash Kosta, Pasala Sanyasi
openalex +2 more sources
Pengkodean Pesan Teks Dengan Proses Penerapan Algoritma Kriptografi Secure Hash Algorithm (SHA)
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi
Romanus Damanik
openalex +3 more sources