Implementation of a new 32-bit Algorithm for Password Hashing
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 6
Abstract
The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from recent history that none of the hash algorithms are completely secure and have been broken one way or the another. The new algorithm described in this paper take some of the good features from MD5 and SHA1. It takes an input of 32-bit and produces a 64-bit hash as a result it makes the system more secure. Various techniques have been employed to induce randomness in the hash so that it makes the process more rigorous and provide fast execution on 32 bit machine.
Authors and Affiliations
Rohan Dham , Sahhil Tanwer , Anjali Arora , Aashita Chhabra
Protein-Protein Interaction Classification Using Jordan Recurrent Neural Network
Proteins form a very important part of a living cell. The biological functions are carried out by the proteins within the cell by interacting with other proteins in other cells. This is called protein-protein interaction...
HARDWARE IMPLEMENTATION OF SATELLITE IMAGE ENHANCEMENT USING DWT LIFTING SCHEME WITH SPARTAN3 FPGA KIT
Enhancement of a digital or satellite image can be done in either of the areas viz, contrast , resolution and sharpness. In this paper we are introducing the hardware implementation of image enhancement using DWT lifting...
A Comparative Review on Hierarchical based and Distance Based Leach Protocol
Wireless Networking is a tools in which numeral mobile nodes can converse with each other openly or not directly through wireless relations. A sensor network is poised of a great number of sensor nodes and a sink. In the...
A Dymamic Service Composition on Social Networks
In today’s world, web services are highly essential as they are required for accomplishing tasks in a matter of second. Web services provide features such as e-Booking, e-Shopping, e-Banking that helps users to acquire e...
Animal Health Observation by Using Query Processing Based On Fuzzy Logic in Wireless Sensor Network
Wireless Sensor Networks (WSNs) query processing based on fuzzy logic provides specifications of the desired data of common natural language, eliminate the custom of threshold values the same as predicates. The query of...