The Database Encryption with Hash Function and DES Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

Convertible multi-authenticated encryption scheme with one-way hash function

To send the message to the recipient securely, authenticated encryption schemes were proposed. In 2008, Wu et al. [T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, T.C. Wu, Convertible multi-authenticated encryption scheme, Information Sciences 178 (1) 256–263.] first proposed a convertible multi-authenticated encryption scheme based on discrete logarithms. However, the author finds that the computation...

متن کامل

Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm

RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security probl...

متن کامل

Integrtation of Encryption and Hash Function for Improved Message Authenticity

Hash function is an important tool for implementing data and information integrity. Presently there are many integrity techniques, that support hashing, but almost every technique faces one or other attack or any other security or performance related issue. The main problem is the possibility of creating forged hash value by intruder, which may be transferred with the changed message, and being...

متن کامل

Modified - DES and Triple Modified - DES Encryption Algorithm with Reduced BER in Wireless Communication

In this paper, we propose a modification to the existing Data Encryption Standard (DES) to make it secure and prone to the bit errors caused by the wireless channel. We observe that using the modified algorithm in wireless channels, improves the bit error rate (BER) performance as well as security compared to DES. Wireless channels are an open medium to intruders and their attacks; encryption i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Engineering and Technology Research

سال: 2019

ISSN: 2475-885X

DOI: 10.12783/dtetr/aemce2019/29511