PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS

Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 1

Abstract

The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic approach to authentication is described. An overview is given of the complexity theoretic definitions and constructions .New criteria are defined and functions satisfying new and existing criteria are studied.

Authors and Affiliations

T. LALITHA , DR. R. UMARANI

Keywords

Related Articles

Enhance Reliability of Web service composition Using Negotiation Mechanism 

A service-oriented architecture (SOA) is essentially a repository of custom and unique services that can selforganize it based on communication. The communication can involve either simple data passing or it could involv...

Performance Study of Live Virtual Machine Migration using KVM Hypervisor 

In a cloud computing environment, migrating operating system instances across distinct physical hosts is a useful tool for administrators of data centers and clusters: It allows a clean separation between hardware and so...

An Efficient Algorithm for Image Enhancement

In the digital image processing field enhancement and removing the noise in the image is a critical issue. We have proposed a new algorithm to enhance color Image corrupted by Gaussian noise using fuzzy logic which descr...

Load and Energy Consumption based Scheduling Algorithm for Wireless Sensor Networks (LECSA)

Sleep/Wake up scheduling for Wireless Sensor Networks has become an essential part for its working. In this paper, the Low Energy Adaptive Clustering Hierarchy (LEACH) which introduced the concept of clustering in sensor...

IMPLEMENTATION OF IMAGE PROCESSING IN REAL TIME CAR PARKING SYSTEM

Car parking lots are an important object class in many traffic and civilian applications. With the problems of increasing urban traffic congestion and the ever increasing shortage of space, these car parking lots are nee...

Download PDF file
  • EP ID EP108147
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

T. LALITHA, DR. R. UMARANI (2010). PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS. Indian Journal of Computer Science and Engineering, 1(1), 58-65. https://europub.co.uk/articles/-A-108147