Modified SHA-1 Algorithm

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Secure Hash Algorithm Sha-1 by Labview

This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from ente...

متن کامل

A New Model for Sha-1 and Md5 Algorithm

Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms are widely used hash functions in IF'Sec and SSL for checking the data integrity. In this paper, we propose a hardware architecture for the standard HMAC function that supports both. Our HMAC design automatically generates the padding words and reuses the key for conse...

متن کامل

Advanced SHA-1 Algorithm Ensuring Stronger Data Integrity

SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until recently, SHA-1 was considered to be the most secure hashing algorithm and also remains the most widely used hashing function till date. In this paper, we review various collision search attacks on the original full 80-step SHA-1 algorithm and present a new optimized version of the algorithm that ...

متن کامل

Evolution of Sha-176 Algorithm

To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified securit...

متن کامل

Parallelizing SHA-1

In this paper, we propose the parallel architecture for high speed calculations of SHA-1, a widely used cryptographic hash function. Parallel SHA-1 consists of a number of base modules which process the message digest in parallel manner. The base module uses state of art SHA-1 acceleration techniques: loop unfolding, pre-processing, and pipelining. We achieved the performance improvement of 5.8...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2018

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v11.i3.pp1027-1034