PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS

Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 1

Abstract

The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic approach to authentication is described. An overview is given of the complexity theoretic definitions and constructions .New criteria are defined and functions satisfying new and existing criteria are studied.

Authors and Affiliations

T. LALITHA , DR. R. UMARANI

Keywords

Related Articles

CERTAIN APPROACHES FOR A COMPLETE MATHEMATICAL TEXTTO-SPEECH SYSTEM

This paper discusses the teaching - learning process of mathematical subjects made accessible to visually disabled students. It aims to provide users a friendly vocal interface with computer and allow visually impaired p...

AN EXTENSIVE ANALYSIS OF MANET ATTACKS USING SPECIAL CHARACTERISTICS 

Wired or Wireless network, security is the most crucial part of any data transmission. Securing Mobile Ad hoc networks is an extremely tough issue because chances of having vulnerabilities are more when comparing to conv...

DESIGN AND ANALYSIS OF MULTIBAND OFDM SYSTEM OVER ULTRA WIDE BAND CHANNELS

Orthogonal Frequency Division Multiplexing (OFDM) has recently been applied in wireless communication systems due to its high data rate transmission capability with high bandwidth efficiency and its robustness to multi-p...

ESTIMATION OF THE BURST LENGTH IN OBS NETWORKS

This paper presents an overview of the optical burst switching (OBS) and discusses the major components. In OBS, the length of the burst arriving at a particular node is unknown, and hence, node design is very complex. I...

MULTIPATH VIRTUAL QUEUE MANAGEMENT SYSTEM FOR EFFECTIVE PACKET SCHEDULING IN MPLS NETWORKS

With the rapid development of communication and networking technologies VOIP has become an alternate to traditional telephony. These applications prefer timeliness in packet delivery. To perform load balancing, link util...

Download PDF file
  • EP ID EP108147
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

T. LALITHA, DR. R. UMARANI (2010). PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS. Indian Journal of Computer Science and Engineering, 1(1), 58-65. https://europub.co.uk/articles/-A-108147