Results 21 to 30 of about 3,272 (163)
Implementasi JSON Web Token Berbasis Algoritma SHA-512 untuk Otentikasi Aplikasi BatikKita
Batikkita is an android based application and web framework laravel web service architecture that is used to bring together between craftsmen and consumers of batik Trusmi and batikkita application with the e-commerce model used is business to customer ...
Andi Setiawan, Ade Irma Purnamasari
doaj +1 more source
Analysis of a SHA-256 Variant [PDF]
SHA-256 is a cryptographic hash function which was proposed in 2000 as a new generation of SHA functions and was adopted as FIPS standard in 2002. In this paper we will consider a SHA-256 variant and a SHACAL-2 variant in which every arithmetic addition is replaced by XOR operation.
Hirotaka Yoshida, Alex Biryukov
openaire +1 more source
Second-Order Differential Collisions for Reduced SHA-256 [PDF]
In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of 64 steps with practical complexity. We have implemented the attack and provide an example.
Biryukov, Alex +3 more
openaire +2 more sources
Kode Autentikasi Hash pada Pesan Teks Berbasis Android
Autentikasi merupakan hal yang sangat penting dalam pengiriman informasi baik berbentuk data ataupun pesan teks. Hal ini dikarenakan dibutuhkan autentikasi terhadap keaslian dan keutuhan data pada saat pertukaran informasi.
Yusfrizal Bin Pairin
doaj +1 more source
Detection of malware in downloaded files using various machine learning models
Malware has become an enormous risk in today’s world. There are different kinds of malware or malicious programs found on the internet. Research shows that malware has grown exponentially over the last decade, causing substantial financial losses to ...
Akshit Kamboj +3 more
doaj +1 more source
Blockchain Enabled Online-Voting System [PDF]
A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies.
Shah Akhil +4 more
doaj +1 more source
Hybrid Chaotic-Based PRNG for Secure Cryptography Applications
This paper suggests a novel one-dimensional (1D) map to address the limitations of traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three control parameters a, μ, and c, allowing it to exhibit chaotic behavior over a ...
Abdullah M. Alnajim +4 more
doaj +1 more source
Collisions for Step-Reduced SHA-256 [PDF]
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the equations that arise from the conditions. Due to the carefully chosen differential and word differences, the message expansion of SHA-256 has little effect on spreading the ...
Ivica Nikolić, Alex Biryukov
openaire +1 more source
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm.
Jongheon Lee +3 more
doaj +1 more source
Security Analysis of SHA-256 and Sisters [PDF]
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux’s attack, nor Dobbertin-style attacks apply.
Henri Gilbert, Helena Handschuh
openaire +1 more source

