Results 1 to 10 of about 2,187 (197)

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]

open access: hybridCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +4 more sources

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: goldСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +6 more sources

A Cryptographic Iterative Hash Function Scheme for Wireless Sensor Network (WSNs) Security Enhancement for Sensor Data Transmission in Blockchain [PDF]

open access: green, 2022
<p>The study will shed light on the proposed system of WSN security for the sensor data transmission using the blockchain. The system will be presented according to the research and practical implications of the blockchain systems. The paper proposes a method for enhancing the data security of wireless sensor networks based on blockchain ...
Mohammed Rajhi
  +7 more sources

Security of a New Cryptographic Hash Function - Titanium [PDF]

open access: greenIndonesian Journal of Electrical Engineering and Computer Science, 2018
This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced. Basic security criteria of random function have been presented and studied on Titanium and then, differential cryptanalysis on ...
Abdullah Nazeeh Saleh   +1 more
openalex   +4 more sources

Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]

open access: bronzeJournal of Information Processing Systems, 2010
Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of
Elena Andreeva   +2 more
openalex   +3 more sources

A secure and efficient cryptographic hash function based on NewFORK-256

open access: yesEgyptian Informatics Journal, 2012
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj   +3 more sources

Basic Cryptographic Concepts and Open Problems in Hash Function Security

open access: hybridProceedings of the West Virginia Academy of Science, 2023
JOHNNA SMITH, Dept of Mathematics, Shepherd University, Shepherdstown, WV, 25443, and DONALD MILLS, Dept of Computer Sciences, Mathematics, and Engineering, Shepherd University, Shepherdstown, WV, 25443. Analysis of basic cryptographic concepts and recent open problems in hash function security.
Johnna Smith, Donald Mills
openalex   +3 more sources

Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction [PDF]

open access: yesScientific Reports
With the rapid development of digital communications, sensitive digital storage security, especially that of images, remains a significant challenge.
M. Mohammed Ibrahim   +6 more
doaj   +2 more sources

Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications

open access: bronzeEdelweiss Applied Science and Technology
This paper explores hash functions and their security challenges, which ensure data integrity and confidentiality in digital systems. With advancing computing power, particularly GPUs and distributed networks, hash functions face increasing threats from brute-force, dictionary, and rainbow table attacks.
Jasmin Redžepagić   +3 more
openalex   +2 more sources

Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications [PDF]

open access: closed, 2023
Non-cryptographic (NC) hash functions are the core part of many networking and security applications such as traffic flow monitoring and deep packet inspection. For these applications, speed is more important than strong cryptographic properties. In Terabit Ethernet networks, the speed of the hash functions can have a significant impact on the overall ...
Mujtaba Hassan   +4 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy