Reference Citations - HerongYang.com - v2.92, by Dr. Herong Yang
Enhanced SHA-1 on Parsing Method and Message Digest Formula
'PKI Tutorials - Herong's Tutorial Examples' tutorial was cited in an academia.edu paper in 2017.
The PKI Tutorials - Herong's Tutorial Examples tutorial was cited in an academia.edu paper in 2017.
Subject: Enhanced SHA-1 on Parsing Method and Message Digest Formula Date: Mar 7, 2017 Author: Philippines Source: http://www.academia.edu/10719013 /Enhanced_SHA-1_on_Parsing_Method_and_Message_Digest_Formula Abstract The Secure Hash Algorithm is one of the most commonly used hashing algorithms on the time being. Experts are proposing for much secured SHA-1 because of some reports and study conducted on SHA-1 collision attacks. The aim of the enhanced Secure Hash Algorithm-1 (SHA-1) is to strengthen its original version that is expected to resist possible SHA-1 collision attacks. The enhanced SHA-1 had integrated the following modification: 1) Enhancement on the pre-processing, specifically on the parsing method. 2) The message digest and the final message digest formula was enhanced by giving additional shifting, xoring and improved mathematical formula. The enhanced SHA-1 maintains its original rounds which consist of 80 rounds and message digest output of 160 bit. Based from the result, the enhanced algorithm specifically on mathematical calculation of parsing method and message digest had shown great effects on its result on the hash value despite of a very minimal time delay, the enhanced algorithm is better and more secure. ... The authors made some revision to its original function and observed that SHA-192 to be better than the existing SHA-1 hashing algorithm in terms of number of brute force attack but in terms of time performance of the algorithm the proposed SHA-192 has a time delay since it needs to generate a 192 bit of message digest . A digital signature consists of a mathematical calculation that demonstrates the authenticity of a message. Dr. Herong Yang  discussed the use of hash algorithm in a digital scheme for email messages. ...
Table of Contents