2015 World Congress on Information Technology and Computer Applications (WCITCA) 2015
DOI: 10.1109/wcitca.2015.7367044
|View full text |Cite
|
Sign up to set email alerts
|

Anti-collision enhancement of a SHA-1 digest using AES encryption by LABVIEW

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…If the hash values differ, the integrity of the message is compromised. Hash is typically applied as integrity verification of password protection, security in protocols, file transmission, tamper detection, and digital signature [10], [11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the hash values differ, the integrity of the message is compromised. Hash is typically applied as integrity verification of password protection, security in protocols, file transmission, tamper detection, and digital signature [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…The SHA-1 with 160-bit hash value is widely used for file fingerprint and verification [18]. SHA-1 is considered simple, fast and the most widely used hash algorithm [11] because of robustness and time efficiency. However, it suffers from some unexpected weaknesses in the internal function and has a low avalanche effect [1], [19]- [21] thus leading to compromised data integrity.…”
mentioning
confidence: 99%
“…If the hash value differs, hackers did alterations during transit resulting in the compromised integrity of the message. Electronically transmitted files, digital signature, tamper detection, password protection, and security in protocols apply hash for integrity verification [5], [6].…”
Section: Introductionmentioning
confidence: 99%