Enhanced SHA-1 on Parsing Method and Message Digest Formula

'PKI Tutorials - Herong's Tutorial Examples' tutorial was cited in an academia.edu paper in 2017.

The PKI Tutorials - Herong's Tutorial Examples tutorial was cited in an academia.edu paper in 2017.

Subject: Enhanced SHA-1 on Parsing Method and Message Digest Formula
Date: Mar 7, 2017
Author: Philippines
Source: http://www.academia.edu/10719013
   /Enhanced_SHA-1_on_Parsing_Method_and_Message_Digest_Formula

Abstract

The Secure Hash Algorithm is one of the most commonly used hashing
algorithms on the time being. Experts are proposing for much secured
SHA-1 because of some reports and study conducted on SHA-1 collision
attacks. The aim of the enhanced Secure Hash Algorithm-1 (SHA-1) is to
strengthen its original version that is expected to resist possible SHA-1
collision attacks. The enhanced SHA-1 had integrated the following
modification: 1) Enhancement on the pre-processing, specifically on the
parsing method. 2) The message digest and the final message digest
formula was enhanced by giving additional shifting, xoring and improved
mathematical formula. The enhanced SHA-1 maintains its original rounds
which consist of 80 rounds and message digest output of 160 bit. Based
from the result, the enhanced algorithm specifically on mathematical
calculation of parsing method and message digest had shown great effects
on its result on the hash value despite of a very minimal time delay, the
enhanced algorithm is better and more secure.
...

The authors made some revision to its original function and observed that
SHA-192 to be better than the existing SHA-1 hashing algorithm in terms
of number of brute force attack but in terms of time performance of the
algorithm the proposed SHA-192 has a time delay since it needs to
generate a 192 bit of message digest [2]. A digital signature consists of
a mathematical calculation that demonstrates the authenticity of a
message. Dr. Herong Yang [4] discussed the use of hash algorithm in a
digital scheme for email messages.
...

Table of Contents

 About This Book

 Reference Citations in 2023

 Reference Citations in 2022

 Reference Citations in 2021

 Reference Citations in 2020

 Reference Citations in 2019

 Reference Citations in 2018

Reference Citations in 2017

 curl/openssl configuration for php under windows

 [RESOLVED] Corrupt dll

 13 Memories Everyone Who Made Mix CDs

 System property javax.xml.soap.MessageFactory

 Add inline image in Rmarkdown

Enhanced SHA-1 on Parsing Method and Message Digest Formula

 DARE Algorithm: A New Security Protocol

 WSDL คืออะไร WSDL คือ เอกสารข้อมูลของ web service

 Tehnologii Web - securitatea aplicațiilor Web

 在Java中,SSL和TLS的区别及其用法

 Nejde se připojit na youtube

 SOAP response error to source

 Read UTF-8 encoded text content inside table cell

 unicode - BOM이없는 UTF-8과 UTF-8의 차이점은 무엇입니까?

 Cách để Xem tập tin XML

 DIFERENÇA ENTRE VIEW E VIEWGROUP NO ANDROID

 τεχνολογιών NFC και QR-code σε πλατφόρμες Android

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003