Enhanced SHA-1 on Parsing Method and Message Digest Formula

'PKI Tutorials - Herong's Tutorial Examples' tutorial was cited in an academia.edu paper in 2017.

The PKI Tutorials - Herong's Tutorial Examples tutorial was cited in an academia.edu paper in 2017.

Subject: Enhanced SHA-1 on Parsing Method and Message Digest Formula
Date: Mar 7, 2017
Author: Philippines
Source: http://www.academia.edu/10719013/Enhanced_SHA-1_on_Parsing_Method_and_Message_Digest_Formula


The Secure Hash Algorithm is one of the most commonly used hashing algorithms 
on the time being. Experts are proposing for much secured SHA-1 because of 
some reports and study conducted on SHA-1 collision attacks. The aim of the 
enhanced Secure Hash Algorithm-1 (SHA-1) is to strengthen its original 
version that is expected to resist possible SHA-1 collision attacks. The 
enhanced SHA-1 had integrated the following modification: 1) Enhancement on 
the pre-processing, specifically on the parsing method. 2) The message digest 
and the final message digest formula was enhanced by giving additional 
shifting, xoring and improved mathematical formula. The enhanced SHA-1 
maintains its original rounds which consist of 80 rounds and message digest 
output of 160 bit. Based from the result, the enhanced algorithm specifically 
on mathematical calculation of parsing method and message digest had shown 
great effects on its result on the hash value despite of a very minimal time 
delay, the enhanced algorithm is better and more secure. 

The authors made some revision to its original function and observed that 
SHA-192 to be better than the existing SHA-1 hashing algorithm in terms of 
number of brute force attack but in terms of time performance of the 
algorithm the proposed SHA-192 has a time delay since it needs to generate a 
192 bit of message digest [2]. A digital signature consists of a mathematical 
calculation that demonstrates the authenticity of a message. Dr. Herong Yang 
[4] discussed the use of hash algorithm in a digital scheme for email messages.

Table of Contents

 About This Book

Reference Citations in 2017

 curl/openssl configuration for php under windows

 [RESOLVED] Corrupt dll

 13 Memories Everyone Who Made Mix CDs

 System property javax.xml.soap.MessageFactory

 Add inline image in Rmarkdown

Enhanced SHA-1 on Parsing Method and Message Digest Formula

 DARE Algorithm: A New Security Protocol

 如何强制java服务器只接受tls 1.2并拒绝tls 1.0和tls 1.1连接

 WSDL คืออะไร WSDL คือ เอกสารข้อมูลของ web service

 Tehnologii Web - securitatea aplicațiilor Web


 Nejde se připojit na youtube

 SOAP response error to source

 Read UTF-8 encoded text content inside table cell

 unicode - BOM이없는 UTF-8과 UTF-8의 차이점은 무엇입니까?

 Cách để Xem tập tin XML


 τεχνολογιών NFC και QR-code σε πλατφόρμες Android

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003

 PDF Printing Version