IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

'SHA1 Message Digest Algorithm Overview' tutorial was cited an International Journal of Computer Science and Mobile Computing paper in 2015.

The SHA1 Message Digest Algorithm Overview tutorial was cited in an International Journal of Computer Science and Mobile Computing paper in 2015.

Subject: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW
Date: Mar 1, 2015
Author: Raaed K. Ibrahim, Ali SH. Hussain, Roula A. Kadhim
Source: http://www.ijcsmc.com/docs/papers/March2015/V4I3201553.pdf

Abstract - This paper presents the implementation of secure hash 
algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many
fields of security systems such as digital signature, tamper 
detection, password protection and so on. SHA-1 is a very important 
algorithm for integrity and authentication realization. The proposed 
algorithm of SHA-1 in this paper implemented by LabVIEW software from 
entering string, padding, SHA-1 core, and message digest to produce 
160 bits hash code for any plaintext.

From the implementation and simulation results of SHA-1 hash function 
obtained in LabVIEW project show that simplicity in modelling hashing 
algorithm, generating hash codes in English plaintext, Arabic 
plaintext, symbols, and numbers. 

...

A sequence of constant words K(0), K(1), ... , K(79) is used in the 
SHA-1. In hex these are given by:
K(t) = 5A827999 ( 0 <= t <= 19)
K(t) = 6ED9EBA1 (20 <= t <= 39)
K(t) = 8F1BBCDC (40 <= t <= 59)
K(t) = CA62C1D6 (60 <= t <= 79). (Eastlake & Jones, 2001) (Lawrence 
C. Washington) (Yang, 2014).

...
[8] t. f. Wikipedia, “SHA-1,” Wikipedia, 19 November 2014. [Online].
   Available: http://en.wikipedia.org/wiki/SHA-1. [Accessed 3 jan. 
   2015].
[9] D. H. Yang, “Cryptography Tutorials - Herong's Tutorial Examples,”
   Retrieved from SHA1 Mesasge Digest Algorithm, 10 sep. 2014. 
   [Online]. Available: http://www.herongyang.com/Cryptography
   /SHA1-MessageDigest-Algorithm-Overview.html. [Accessed 10 jan. 
   2015].

Table of Contents

 About This Book

 Reference Citations in 2016

Reference Citations in 2015

 SSL/TLS Overview - Change Cipher Spec Protocol

 PFX to Java Keystore / Extract private key from Java Keystore

 Android talks #08 decompiling android applications

 Cpronto 2.5 Administration Guide

IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW

 Cryptographic Protocols - The Peruvian Coin Flip

 How to View XML Files

 Bug 378637 - Add support for connecting to HTTP proxy over HTTPS

 an information literacy technology for chemistry documents

 org.jruby.exceptions.RaiseException: stack level too deep

 Another function that helps programmers calculate

 CONNECTING TO A SOAP WEB SERVICE

 Application of the Enhanced SHA-1

 New Media Workshop [COMM7200]

 Apex Soap call authentication problem

 Recording Video of an Android Device

 Java HTTPS server code failing

 How to Capture Logcat Files Using ADB

 Modifying and Recompiling Settings.APK

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003

 PDF Printing Version