Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Implementation of Security Package for Data Integrity with Various Hash Algorithms


Affiliations
1 Department of Electronics and Communication Engineering, Velammal College of Engineering & Technology, Madurai, Tamil Nadu, India
2 Velammal College of Engineering & Technology, Madurai, Tamil Nadu, India
     

   Subscribe/Renew Journal


This paper deals with the implementation of security package of Hash algorithms which can be chosen by the user for their desired level of security. The concept of encryption and decryption of message is not enough for the security of data’s in current communication. Hence the concept of Message authentication is developed. One type of authentication is by Hash algorithm. Hash algorithm creates the miniature of the message. Hash algorithm takes an input message of length less than 264 (varies with the type of algorithm) and gives the output in fixed length. For the application point of view we need the comparison of their performance. Hence this paper involves the following categories.
a Implementation of MD5 algorithm
b Implementation of SHA algorithm
c Implementation of RIPEMD algorithm
d Comparison of algorithms with respect to their
a. Speed
b. Security
e Implementation of software package.


Keywords

HASH, MD5, RIPEMD, SHA.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 168

PDF Views: 2




  • Implementation of Security Package for Data Integrity with Various Hash Algorithms

Abstract Views: 168  |  PDF Views: 2

Authors

B. Sridevi
Department of Electronics and Communication Engineering, Velammal College of Engineering & Technology, Madurai, Tamil Nadu, India
N. SureshKumar
Velammal College of Engineering & Technology, Madurai, Tamil Nadu, India

Abstract


This paper deals with the implementation of security package of Hash algorithms which can be chosen by the user for their desired level of security. The concept of encryption and decryption of message is not enough for the security of data’s in current communication. Hence the concept of Message authentication is developed. One type of authentication is by Hash algorithm. Hash algorithm creates the miniature of the message. Hash algorithm takes an input message of length less than 264 (varies with the type of algorithm) and gives the output in fixed length. For the application point of view we need the comparison of their performance. Hence this paper involves the following categories.
a Implementation of MD5 algorithm
b Implementation of SHA algorithm
c Implementation of RIPEMD algorithm
d Comparison of algorithms with respect to their
a. Speed
b. Security
e Implementation of software package.


Keywords


HASH, MD5, RIPEMD, SHA.