نتایج جستجو برای: hmac
تعداد نتایج: 237 فیلتر نتایج به سال:
There is a growing interest in providing communications to “Challenged” environments which have been hitherto isolated and disconnected due to the lack of communications infrastructure. These are regions which lie at the edge of the current Internet. Confidentiality, integrity and availability are the three major security requirements of any secured system or network. This paper presents our wo...
This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications reduced hardware requirements. MAME takes a 256-bit message block and a 256-bit chaining variable as input and produces a 256-bit output. Seen in the light of attacks on MD5 and SHA-1, our design strategy enables us to evaluate the security of MAME against known ...
We present a new message authentication code. It is based on a two trail construction, which underlies the unkeyed hash function RIPEMD-160. It is in comparison with the MDx-MAC based on RIPEMD-160, much more efficient on short messages (that is on messages of 512 or 1024 bits) and percentage-wise a little bit more efficient on long messages. Moreover, it handles key-changes very efficiently. T...
Status of this Memo By submitting this Internet-Draft, I certify that any applicable patent or other IPR claims of which I am aware have been disclosed, or will be disclosed, and any of which I become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups...
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), specifically SHA-224 (RFC 3874), SHA-256, ...
In the few years since Raspberry Pi was released in 2012, countless microcomputers based on ARM architecture have been introduced.Their small size, high performance relative to their power consumption, and ability run popular Linux operating system make them ideal for a wide range of tasks. Information security is an area particular importance. Different encryption encoding algorithms play impo...
Two parties communicating across an insecure channel need a method by which any attempt to modify the information sent by one to the other, or fake its origin, is detected. Most commonly such a mechanism is based on a shared key between the parties, and in this setting is usually called a MAC, or Message Authentication Code. (Other terms include Integrity Check Value or Cryptographic Checksum)....
VANET is an emerging type of distributed network and it is dynamic in nature which provides variety of services such as detecting oncoming collision and provides warning signal to alert the driver. In military application data security is an imp issues. This paper presents a secured and an efficient way of sending data and image in encrypted form using HMAC based authentication and Visual Crypt...
The cryptographic algorithms employed in Internet security must be able to handle packets which may vary in size over a large range. Most of the cryptographic hash algorithms process messages by partitioning them into large blocks. Due to this fact the messages have to be prepared by padding the required amount of zero bits to get an integer number of blocks. This process contributes a consider...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید