Back to Search
Start Over
Implementation and comparison of the functions of building blocks in SHA-2 family used in secured cloud applications.
- Source :
-
Journal of Discrete Mathematical Sciences & Cryptography . Mar2019, Vol. 22 Issue 2, p323-335. 13p. - Publication Year :
- 2019
-
Abstract
- A Secure hash algorithm is grounded on the principles of message digest algorithms that are used in the design of the algorithms like MD4 and MD5. The main application of this algorithm is that it can be used in security applications for authentication and data validation like message authentication, digital signature and fingerprinting. It can also be used in detecting duplicate data and uniquely identifying files. In this paper we analyzed the role of some of the building blocks of SHA-2 family.We have demonstrated that the disturbance correction strategy is applicable to the SHA-512 architecture and proved that functions Σ, ∂ are vital for the security of SHA-512, without them it is possible to find collisions with complexity 264 hash operations. We also demonstrated the functioning of 256- bit which was previously designed for 32 bit architecture but in this paper it is implemented using 64- bit architecture. [ABSTRACT FROM AUTHOR]
- Subjects :
- *BLOCKS (Building materials)
*BIOMETRIC identification
Subjects
Details
- Language :
- English
- ISSN :
- 09720529
- Volume :
- 22
- Issue :
- 2
- Database :
- Academic Search Index
- Journal :
- Journal of Discrete Mathematical Sciences & Cryptography
- Publication Type :
- Academic Journal
- Accession number :
- 135206058
- Full Text :
- https://doi.org/10.1080/09720529.2019.1582865