Implementation and Design of SHA-1 Algorithm

Chandra sekhar murala, M Purnasekhar

Abstract


The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA-1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.


Keywords


SHA-2, plenty, cryptography, masquerade.

References


Bruce Schneier, “Applied Crptography”, John Wiley and Sons, Inc.

Press, 1996.Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.

NIST, “Secure Hash Standard”, FIPS PUB 180-1, May 1993.

NIST, “with change notice Secure Hash Standard”, FIPS PUB 180-2 August 2002.

NIST, “Digital Signature Standard (DDS)”, FIBS PUB 186 May 1994.

“An Overview of Cryptographic Hash Functions and Their Uses”, SANS Institute, 2003

Federal Information Processing Standards. Digital Signature Standard (DSS). FIPS PUB 186-2, January 27, 2000.

“Advanced Hash Calculator”, www.filesland.com, Version 2.33.

Yong Kyu Kang, Dae Won Kim, Taek Won Kwon, Jun Rim Choi, “An Efficient Implementation of Hash Function Processor for IPSEC”, In Proceedings of the IEEE Asia- Pacific Conference on ASIC, pp. 93-96, August. 2002.

N. Sklavos, G. Dimitroulakos, O. Koufopavlou, “An Ultra High Speed Architecture for VLSI Implementation of Hash Functions”, Proceedings of the 10th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2003) pp. 990-993 Vol.3, 2003.

Harris Michail, Athanasios P. Kakarountas, OdysseasKoufopavlou, Costas E. Goutis, “A Low Power and High Throughput Implementation of the SHA-1 Hash Function”, IEEE International Symposium on Circuits and Systems (ISCAS 2005), pp. 4086-4089 Vol.4.,2005.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.