منابع مشابه
An Improved Fast and Secure Hash Algorithm
Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and im...
متن کاملImplementation of Secure Hash Algorithm Sha-1 by Labview
This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from ente...
متن کاملSHAvisual: A Visualization Tool for the Secure Hash Algorithm
Data security is vital to the world we live in, and the foundation that secure communication is built upon is cryptography. Cryptography is a course that is regularly offered at colleges and universities. In our experience, computer science students find that understanding the sophisticated mathematics behind the crypto-systems is a daunting task, while math majors often get lost in the details...
متن کاملNESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by NIST, motivates us to design the new hash function which has a parallel structure. Advantages of parallel structures and also using some ideas from the designing procedure of block-cipher-based hash functions strengthen our proposed hash function both in security and in ...
متن کاملA Secure Perceptual Hash Algorithm for Image Content Authentication
Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection. It extracts features from DFT coefficients of image blocks. Experiments show that the hash has strong robustne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Egyptian Mathematical Society
سال: 2019
ISSN: 2090-9128
DOI: 10.1186/s42787-019-0037-6