Results 231 to 240 of about 142,210 (279)

Secure Hash Algorithm based on Efficient Chaotic Neural Network

2016 International Conference on Communications (COMM), 2016
Secure Hash Algorithm (SHA) is the most popularstandard of Hash functions. Several security protocols useSHA to provide message integrity, authentication and digitalsignature. Nowadays, a new technology based on Chaotic NeuralNetwork is used to design Hash functions due to the followingimportant properties of Neural Networks: non-linearity,compression,
Abdoun, Nabil   +5 more
openaire   +4 more sources

Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal

2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019
In this paper, the application of the enhanced secure hash algorithm-512 is implemented on web applications specifically in password hashing. In addition to the enhancement of hash function, hill cipher is included for the salt generation to increase the complexity of generating hash tables that may be used as an attack on the algorithm. The testing of
Froilan E. De Guzman   +2 more
openaire   +3 more sources

Enhanced Secure Hash Algorithm-512 based on Quadratic Function

2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), 2018
This paper attempts to introduce the enhanced SHA-1 algorithm which features a simple quadratic function that will control the selection of primitive function and constant used per round of SHA-1. The message digest for this enhancement is designed for 512 hashed value that will answer the possible occurrence of hash collisions. Moreover, this features
Ruji P. Medina   +2 more
openaire   +3 more sources

SHAvisual

Proceedings of the 2014 conference on Innovation & technology in computer science education - ITiCSE '14, 2014
This poster presents a visualization tool SHAvisual for instructors to teach and students to learn the SHA-512 algorithm visually with demo and practice modes. This poster will also discuss some findings of classroom use and student reactions, which are very positive and encouraging.
Melissa S. Keranen   +5 more
openaire   +2 more sources

Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256

International Conference on Communication Systems and Network Technologies, 2022
To verify the integrity and confidentiality of data communicated through the web is a very big issue worldwide because every person wants very fast computing and secure electronic data communication via the web.
B. Ambedkar, P. Bharti, Akhtar Husain
semanticscholar   +1 more source

Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality

2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), 2022
The use of digital images is increasingly widespread currently. There is a need for security in digital photos. Cryptography is a technique that can be applied to secure data.
Rojali   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy