Implementation of Secure Hash Algorithm Sha-1 by Labview
نویسندگان
چکیده
This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from entering string, padding, SHA-1 core, and message digest to produce 160 bits hash code for any plaintext. From the implementation and simulation results of SHA-1 hash function obtained in LabVIEW project show that simplicity in modelling hashing algorithm, generating hash codes in English plaintext, Arabic plaintext, symbols, and numbers. Keywords— SHA-1 , integrity , hash function ,LabVIEW ,password security
منابع مشابه
A Fast Portable Implementation of the Secure Hash Algorithm
In 1992, NIST announced a proposed standard for a collision-free hash function. The algorithm for producing the hash value is known as the Secure Hash Algorithm (SHA), and the standard using the algorithm in known as the Secure Hash Standard (SHS). Later, an announcement was made that a scientist at NSA had discovered a weakness in the original algorithm. A revision to this standard was then an...
متن کاملA Fast Portable Implementation of the Secure Hash Algorithm , III ∗ †
In 1992, NIST announced a proposed standard for a collision-free hash function. The algorithm for producing the hash value is known as the Secure Hash Algorithm (SHA), and the standard using the algorithm in known as the Secure Hash Standard (SHS). Later, an announcement was made that a scientist at NSA had discovered a weakness in the original algorithm. A revision to this standard was then an...
متن کاملNew Techniques for Hardware Implementations of Sha
Secure Hash Algorithms are one of the forms of cryptographic algorithms. SHA hash functions are widely used security constructs. However, they are software implementations of SHA. This paper proposes techniques for hardware implementation of SHA. In order to provide security and improve performance, these methods are used in hardware reutilization and operation rescheduling. The purpose of impl...
متن کاملKeyed/Unkeyed SHA-2
In the draft FIPS 180-2, NIST published SHA-2 as a new version of secure hash algorithm. SHA-2 offers four secure hash algorithms including SHA-1, SHA-256, SHA-384, and SHA-512. In other words, SHA-2 may have outputs 160, 256, 384, or 512 bits of message digest. However, SHA-2 algorithm uses fixed and predefined parameters in execution. It may be vulnerable to attacks. In this paper, we propose...
متن کاملFPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions
The utilization of hash functions and Keyed-Hash Message Authentication Codes (HMAC) are of utmost importance to ensure data integrity and data origin authentication in digital communications. Until recently, protocols used in the Internet, such as the Internet Key Exchange (IKE), Internet Protocol Security (IPSec) and Transport Layer Security (TLS), employed HMAC in conjunction with MD5 and SH...
متن کامل