... FIPS 180-4 specifies two new secure cryptographic hash algorithms: secure hashing algorithms SHA-512/224 and SHA-512/256; it also includes a method for determining initial value(s) for any future SHA-512-based hash algorithm(s). FIPS 180-4 also removes a ...
Tópico(s):
2013 - Taylor & Francis | Cryptologia
L. Thulasimani, Madheswaran Muthusamy,
... in security protocols. This paper presents a new Secure Hash Algorithm called (SHA(192). It uses a famous secure hash algorithm given by the National Institute of Standard and ...
Tópico(s): Cryptographic Implementations and Security
2012 - Zarqa University | The International Arab Journal of Information Technology
Muzaffar Rao, Thomas Newe, Ian Grout,
... of a newly selected cryptographic hash algorithm called Secure Hash Algorithm – 3 (SHA-3) on Xilinx FPGAs (Spartan, Virtex, ...
Tópico(s): Radiation Effects in Electronics
2014 - Exeley Inc | International Journal on Smart Sensing and Intelligent Systems
... known and officially used hash function is the Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2). In recent years serious attacks ... an effort to develop a modern and more secure hash algorithms through a hash function competition for usage in ...
Tópico(s): Coding theory and cryptography
2012 - Institute of Electrical and Electronics Engineers | IEEE Latin America Transactions
Nithin R. Chandran, Ebin M. Manuel,
... which is performed using a cryptographic hash function. Secure Hash Algorithm can be an efficient hashing technique.SHA-3 is the most recent and efficient Secure Hash Algorithm. Keccak has been chosen as the official algorithm ... we propose a modification on the design of Secure Hash Algorithm (SHA-3) on Xilinx Field ProgrammableGate Array (FPGA) ...
Tópico(s): Network Packet Processing and Optimization
2016 - Elsevier BV | Procedia Technology
Ravilla Dilli, Chandra Shekar Reddy Putta,
... will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or ... Network Simulator 2 (NS2) and hashing algorithm, keyed-Hash Message Authentication Code – Secure Hashing Algorithm 512 (HMAC-SHA512) is implemented for the Authentication ...
Tópico(s): Cooperative Communication and Network Coding
2015 - Elsevier BV | Procedia Computer Science
Amna Amanat, Muhammad Rizwan, Carsten Maple, Yousaf Bin Zikria, Ahmad Almadhor, Sung Won Kim,
... Proof of Stake (POS) cryptography consensus mechanism and Secure Hash Algorithm (SHA256) to secure EHR sharing among different electronic ... existing solutions, which include Proof-Of-Work (POW), Secure Hash Algorithm (SHA-1), and Message Digest (MD5) in terms ...
Tópico(s): IoT and Edge/Fog Computing
2022 - Frontiers Media | Frontiers in Public Health
Chao Lei, Rui Lin, Yajie Li, Bo Wang, Mingrui Zhang, Yongli Zhao, Jie Zhang,
... the case of a fiber-tapping attack. A secure hash algorithm, SHA3-512, is used to perform privacy amplification to obtain the virtually secure key. An error-free PLKD rate reaches 39. ...
Tópico(s): Quantum Computing
2023 - Institute of Electrical and Electronics Engineers | Journal of Lightwave Technology
... context of competitions such as Advanced Encryption Standard, Secure Hash Algorithm 3, or currently CAESAR. However, due to the ... in eStream (2005–2008), 51 hash functions in Secure Hash Algorithm 3 (2008–2012), and 55 authenticated-encryption algorithms ...
Tópico(s): Advanced Malware Detection Techniques
2018 - Institution of Engineering and Technology | IET Information Security
Mobashshirur Rahman, Anita Murmu, Piyush Kumar, Nageswara Rao Moparthi, Suyel Namasudra,
... process. Here, the Hénon-Sine Map (HSM-512), Secure Hash Algorithm (SHA-256), and DNA computing are also used ...
Tópico(s): Biometric Identification and Security
2024 - Elsevier BV | Journal of Information Security and Applications
Josip Zidar, Tomislav Matić, Ivan Aleksi, Željko Hocenski,
... Fourier Transform (FFT), Cyclic Redundancy Check 32 (CRC32), Secure Hash Algorithm 256 (SHA256), and Message-Digest Algorithm 5 (MD5) ...
Tópico(s): IoT and Edge/Fog Computing
2024 - Multidisciplinary Digital Publishing Institute | Electronics
Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah,
... monitoring system. Pentatope-based elliptic curve encryption and secure hash algorithm (SHA) are employed to provide anonymity in data ...
Tópico(s): Video Surveillance and Tracking Methods
2023 - Multidisciplinary Digital Publishing Institute | Mathematics
Manish Kumar Gupta, Rajendra Kumar Dwivedi,
Internet of Things (IoT) fog nodes are distributed near end-user devices to mitigate the impacts of low delay, position awareness, and spatial spread, which aren't permitted by numerous IoT apps. Fog computing (FC) also speeds up reaction times by decreasing the quantity of data sent to the cloud. Despite these advantages, FC still has a lot of work to do to fulfill security and privacy standards. The constraints of the FC resources are the cause of these difficulties. In reality, FC could raise fresh ...
Tópico(s): Internet of Things and AI
2023 - European Alliance for Innovation | ICST Transactions on Scalable Information Systems
The Secure Hash Algorithm SHA-512 is a dedicated cryptographic hash function widely considered for use in data integrity assurance and ...
Tópico(s): Network Packet Processing and Optimization
2007 - Oxford University Press | The Computer Journal
Meiliana Sumagita, Imam Riadi,
Tópico(s): IoT and GPS-based Vehicle Safety Systems
2018 - | International Journal of Cyber-Security and Digital Forensics
Senthil Murugan Nagarajan, Ganesh Gopal Deverajan, U Kumaran, M. Thirunavukkarasan, Mohammad Dahman Alshehri, Salem Alkhalaf,
... RC6 and the encrypted output is send to secure hash algorithm (SHA256) for hashing process based on cipher value which improves data integrity. Furthermore, these high-security algorithms are used to provide availability and confidentiality to protect sensitive information from implantable devices and strengthen the health care systems through enhanced services. Comprehensive experimental analysis and simulation results indicate that the proposed scheme is more secure against various known attacks, such as denial of ...
Tópico(s): Blockchain Technology Applications and Security
2021 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Industrial Informatics
Samaher Ahmed Yousiff, Ra'ad A. Muhajjar, Mishall Al-Zubaidie,
... the use of a hash function such as secure hash algorithm 384 (SHA-384), which is a one-way encryption function and was used to verify the BC data integrity so that it was dicult to hack the data and thus be the data transmission process is more secure. Also, the Espressif 32 (ESP32) device was chosen ...
Tópico(s): IoT-based Smart Home Systems
2023 - Slovenian Society Informatika | Informatica
Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, S. Vassiliadis,
... new set of techniques for hardware implementations of secure hash algorithm (SHA) hash functions. These techniques consist mostly in ...
Tópico(s): Interconnection Networks and Systems
2008 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Very Large Scale Integration (VLSI) Systems
... novel dataflow multi-core computing model for the secure hash algorithm-3. The resulting hardware was implemented in field- ...
Tópico(s): Cryptography and Data Security
2018 - Institute of Electrical and Electronics Engineers | IEEE Access
Christos Xenakis, Nikolaos Laoutaris, Lazaros Merakos, Ioannis Stavrakakis,
... Advanced Encryption Standard (AES), Message Digest (MD5) and Secure Hash Algorithm 1 (SHA-1). We consider the processing and ...
Tópico(s): Coding theory and cryptography
2006 - Elsevier BV | Computer Networks
Siddharth Agarwal, Abhinav Rungta, R. Padmavathy, M. Ravi Shankar, Nipun Rajan,
Recently, a fast and secure hash function SFHA - 256 has been proposed and claimed as more secure and as having a better performance than the SHA - 256. In this paper an improved version of SFHA - 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and improved SFHA-256. From the analysis it can be concluded that the newly proposed algorithm is more secure, efficient, ...
Tópico(s): Cryptography and Data Security
2012 - | Journal of Information Processing Systems
Argyrios Sideris, Theodora Sanida, Minas Dasygenis,
... infrastructures. The new standard cryptographic hash function is Secure Hash Algorithm 3 (SHA-3), which is not vulnerable to ...
Tópico(s): Coding theory and cryptography
2020 - Multidisciplinary Digital Publishing Institute | Technologies
Christian Rechberger, Vincent Rijmen, Nicolas Sklavos,
... solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
Tópico(s): Advanced Malware Detection Techniques
2006 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy
... we explore alternative architectures for the implementation of hash algorithms of the secure hash standards SHA-256 and SHA-512 on FPGAs ...
Tópico(s): Coding theory and cryptography
2005 - Elsevier BV | Computers & Electrical Engineering
Koshiro Onuki, Kenichiro Cho, Yoshihiko Horio, Takaya Miyano,
... method of secret-key exchange assisted by a secure hash algorithm for a stream cipher based on the augmented ... of the keys that are generated by a secure hash algorithm based on the logistic map. We discuss the ...
Tópico(s): Cellular Automata and Applications
2022 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems I Regular Papers
Zeyad A. Al-Odat, Mazhar Ali, Assad Abbas, Samee U. Khan,
Cryptographic hash functions are widely used primitives with a purpose to ensure the integrity of data. Hash functions are also utilized in conjunction with digital signatures to provide authentication and non-repudiation services. The SHA has been developed over time by the National Institute of Standards and Technology for security, optimal performance, and robustness. The best-known hash standards are SHA-1, SHA-2, and SHA-3. Security is the most notable criterion for evaluating the hash functions. ...
Tópico(s): Coding theory and cryptography
2020 - Association for Computing Machinery | ACM Computing Surveys
Pabitra Pal, Biswapati Jana, Jaydeb Bhaumik,
... scheme. Authentication code (AC) has been generated utilising secure hash algorithm-512 on watermark image. The cover image (CI) ... are better than the scheme based on MD5, secure hash algorithm (SHA)-1 in terms of security and its ...
Tópico(s): Digital Media Forensic Detection
2019 - Institution of Engineering and Technology | IET Image Processing
Ignacio Algredo‐Badillo, Claudia Feregrino-Uribe, René Cumplido, Miguel Morales‐Sandoval,
Hash function algorithms are widely used to provide security services of integrity and authentication, being SHA-2 the latest set of hash algorithms standardized by the US Federal Government. The main computation block in SHA-2 algorithms is governed by a loop with high data dependence for which several implementation strategies are explored in this work as well as designs efficiently mapped to hardware architectures. Four new different hardware architectures are proposed to improve the performance ...
Tópico(s): Chaos-based Image/Signal Encryption
2012 - Elsevier BV | Microprocessors and Microsystems
Athanasios Kakarountas, Haralambos Michail, A. Milidonis, Costas E. Goutis, George Theodoridis,
Tópico(s): Advanced Malware Detection Techniques
2006 - Springer Science+Business Media | The Journal of Supercomputing
Jerzy Kaczmarek, Michał R. Wróbel,
... cryptographic functions available such as Message Digest Algorithm, Secure Hash Algorithm and Tiger Message Digest Algorithm. The algorithms must ...
Tópico(s): Security and Verification in Computing
2013 - Institution of Engineering and Technology | IET Information Security