Jpeg/Exif Message Digest Compilation With SHA512 Hash Function
نویسندگان
چکیده
منابع مشابه
A Secure Hash Function MD-192 With Modified Message Expansion
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...
متن کاملAn Improved Hash Function Based on the Tillich-Zémor Hash Function
Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.
متن کاملIntegrtation of Encryption and Hash Function for Improved Message Authenticity
Hash function is an important tool for implementing data and information integrity. Presently there are many integrity techniques, that support hashing, but almost every technique faces one or other attack or any other security or performance related issue. The main problem is the possibility of creating forged hash value by intruder, which may be transferred with the changed message, and being...
متن کاملRFC 1320 MD 4 Message - Digest Algorithm
The MD4 Message-Digest Algorithm Status of thie Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Acknowlegements We would like to thank Don Coppersmith, Burt Kaliski, Ralph Merkle, and Noam Nisan for numerous helpful comments and suggestions. Table of Contents 1. Executive Summary 1 2. Terminology a...
متن کاملSecuring AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. The binding force in these...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: CSRID (Computer Science Research and Its Development Journal)
سال: 2021
ISSN: 2460-870X,2085-1367
DOI: 10.22303/csrid.11.1.2019.44-53