PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS

Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 1

Abstract

The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic approach to authentication is described. An overview is given of the complexity theoretic definitions and constructions .New criteria are defined and functions satisfying new and existing criteria are studied.

Authors and Affiliations

T. LALITHA , DR. R. UMARANI

Keywords

Related Articles

PERFORMANCE TESTING CONCURRENT ACCESS ISSUE AND POSSIBLE SOLUTIONS – A CLASSIC CASE OF PRODUCER-CONSUMER

Concurrent access issue is one of the most frequently encountered issues in performance testing. The issue is a classic case of producer consumer problem where multiple clients try to access same code on the server at th...

GDRP: A NOVEL APPROACH FOR POWER OPTIMIZATION IN WIRED CORE NETWORKS

The numbers of applications in the internet are increasing tremendously day by day which results into degrading the network performance because of heavy traffic load on the core routers which causes into more power consu...

Moving Object Tracking Techniques: A Critical Review

Moving Object Tracking is one of the challenging problems in the field of computer vision, surveillance, traffic monitoring, video compression etc. The goal of object tracking is to locate a moving object in consecutive...

Evaluation of the Signal to Noise in Different Radiographic Methods and in Standard Digitizer

Radiography is one of the methods to find volumetric defects in Non Destructive Technique (NDT). Radiographic film is digitized for the further assessment of the defects. The successful use of radiography depends on the...

Fuzzy Cluster Quality Index using Decision Theory

stering can be defined as the process of grouping physical or abstract objects into classes of similar objects. It’s an unsupervised learning problem of organizing unlabeled objects into natural groups in such a way obje...

Download PDF file
  • EP ID EP108147
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

T. LALITHA, DR. R. UMARANI (2010). PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS. Indian Journal of Computer Science and Engineering, 1(1), 58-65. https://europub.co.uk/articles/-A-108147