Implementation of a new 32-bit Algorithm for Password Hashing
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 6
Abstract
The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from recent history that none of the hash algorithms are completely secure and have been broken one way or the another. The new algorithm described in this paper take some of the good features from MD5 and SHA1. It takes an input of 32-bit and produces a 64-bit hash as a result it makes the system more secure. Various techniques have been employed to induce randomness in the hash so that it makes the process more rigorous and provide fast execution on 32 bit machine.
Authors and Affiliations
Rohan Dham , Sahhil Tanwer , Anjali Arora , Aashita Chhabra
A Modeling Tool to Minimize the Expected Waiting Time of Call Center’s Customers with Optimized Utilization of Resources
In order to deliver assured Quality of Service (QoS) to the customer in terms of minimizing the expected waiting time in the queue; the service providers are putting a lot of effort. The varying calling pattern of the cu...
Designing A Decision Support System For Weaning Using Ann – A Preliminary Study
Patients require mechanical ventilator support when the ventilatory and/or gas exchange capabilities of their own respiratory system fail. Mechanical ventilation can have life threatening complications, it should be disc...
SURVEY OF ACCIDENT SEVERITY ESTIMATION USING DATA MINING TECHNIQUES
As technology has been improved by many changes and inventions are made almost every day. Traumatic events come in many different ways at many different times of one’s life. Recent trends on the advantage of communicatio...
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the...
TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY
Sensor nodes in wireless sensor network are densely deployed to monitor the physical world. In distributed access control user can directly access data from sensor nodes. While accessing data from sensor nodes user detai...