Implementation and Design of SHA-1 Algorithm
Abstract
The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA-1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.
Keywords
References
Bruce Schneier, “Applied Crptographyâ€, John Wiley and Sons, Inc.
Press, 1996.Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
NIST, “Secure Hash Standardâ€, FIPS PUB 180-1, May 1993.
NIST, “with change notice Secure Hash Standardâ€, FIPS PUB 180-2 August 2002.
NIST, “Digital Signature Standard (DDS)â€, FIBS PUB 186 May 1994.
“An Overview of Cryptographic Hash Functions and Their Usesâ€, SANS Institute, 2003
Federal Information Processing Standards. Digital Signature Standard (DSS). FIPS PUB 186-2, January 27, 2000.
“Advanced Hash Calculatorâ€, www.filesland.com, Version 2.33.
Yong Kyu Kang, Dae Won Kim, Taek Won Kwon, Jun Rim Choi, “An Efficient Implementation of Hash Function Processor for IPSECâ€, In Proceedings of the IEEE Asia- Pacific Conference on ASIC, pp. 93-96, August. 2002.
N. Sklavos, G. Dimitroulakos, O. Koufopavlou, “An Ultra High Speed Architecture for VLSI Implementation of Hash Functionsâ€, Proceedings of the 10th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2003) pp. 990-993 Vol.3, 2003.
Harris Michail, Athanasios P. Kakarountas, OdysseasKoufopavlou, Costas E. Goutis, “A Low Power and High Throughput Implementation of the SHA-1 Hash Functionâ€, IEEE International Symposium on Circuits and Systems (ISCAS 2005), pp. 4086-4089 Vol.4.,2005.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â