Results 251 to 260 of about 46,179 (288)
Some of the next articles are maybe not open access.
Chaos-based joint speech encryption scheme using SHA-1
Multimedia Tools and Applications, 2021In this paper, the speech signal is encrypted using multiple chaotic maps and cryptographic protocols. The input signal is fragmented and scrambled into four segments using cubic map. In order to make the signal invulnerable against attacks, scrambled signal is processed through various one-dimensional chaotic maps like cubic, logistic, skew-tent, and ...
Gurvir Kaur +2 more
openaire +1 more source
Analysis of SHA-1 in Encryption Mode
2001This paper analyses the cryptographic hash function SHA- 1 in encryption mode. A detailed analysis is given of the resistance of SHA-1 against the most powerful known attacks today. It is concluded that none of these attacks can be applied successfully in practice to SHA-1.
Helena Handschuh +2 more
openaire +1 more source
Hardware design for SHA-1 based on FPGA
2011 International Conference on Electronics, Communications and Control (ICECC), 2011The SHA-1 algorithm in Hash Function was widely used in TPM hardware design. This paper proposes a design of SHA-1 hash function operations on FPGA hardware implementations. Optimized the structure of the module about the algorithm, which implement the simulation and synthesis.
Zhou Hua, Liu Qiao
openaire +1 more source
Introducing Practical SHA-1 Collisions to the Classroom
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019There is a lack of hands-on exercises in cryptanalysis offered at the university level for a variety of reasons. One reason is the high amount of computations needed to complete cryptanalysis attacks. However, enabling students to perform fixed prefix SHA-1 collision attacks on PDFs does not require any advanced computation power. This paper presents a
Monique Mezher, Ahmed Ibrahim
openaire +1 more source
Design of SHA-1 Algorithm Based on FPGA
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010SHA (Secure Hash Algorithm) is a famous message compress standard used in computer cryptography, it can compress a long message to become a short message abstract. The algorithm can be used in many protocols or Secure Algorithm, especially for DSS. In this paper, the improved version SHA-1 is analysised, then improved and implemented in HDL (Hardware ...
Cheng Xiao-hui, Deng Jian-zhi
openaire +1 more source
Low area and high speed SHA-1 implementation
2011 International SoC Design Conference, 2011In this paper, a low area and high speed SHA-1 implementation with multi-input addition based on a carry-save adder is proposed. Compared with the fastest SHA-1 design up to date, our implementation reduces the area by 24.5% as well as increases the speed by 13.6%. When the proposed scheme keeps the same clock frequency as the counterpart, it decreases
Eun-Gu Jung, Daewan Han, Jeong-Gun Lee
openaire +1 more source
An Efficient Implementation of SHA-1 Hash Function
2006 IEEE International Conference on Electro/Information Technology, 2006The latest cryptographical application demands in a typical embedded system demand both high speed and small area. Hash function has been widely used in the digital signature, message authentication. In this paper, a new area efficient SHA-1 implementation is proposed.
openaire +1 more source
Processador de Uso Específico para o Algoritmo SHA-1
Anais do XVII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2017), 2017Este trabalho propõe um hardware de aplicação específica (Application-Specific System Processor, ASSP) para o algoritmo Secure Hash Algorithm 1 (SHA-1). O hardware proposto foi implementado em uma Field Programmable Gate Array (FPGA) Xilinx Virtex 6 xc6vlx240t1ff1156.
Carlos E. B. Santos Junior +1 more
openaire +1 more source
Visualizing Secure Hash Algorithm (SHA-1) on the Web
2011Cryptographic hash functions play an important role in modern cryptography. In this paper, we present web-based interactive visualization applets for teaching secure hash algorithm (SHA-1). The visualization applets lead to more efficient learning outcomes.
Dalia B. Nasr +2 more
openaire +1 more source
Finding Good Differential Patterns for Attacks on SHA-1
2006In this paper we analyse properties of the message expansion algorithm of SHA-1 and describe a method of finding differential patterns that may be used to attack reduced versions of SHA-1. We show that the problem of finding optimal differential patterns for SHA-1 is equivalent to the problem of finding minimal weight codeword in a large linear code ...
Matusiewicz, Krystian, Pieprzyk, Josef
openaire +2 more sources

