VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512

Author(s):  
R. Kayalvizhi ◽  
R. Harihara Subramanian ◽  
R. Girish Santhosh ◽  
J. Gurubaran ◽  
V. Vaidehi
2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


2015 ◽  
Author(s):  
Ching-Kuang Shene ◽  
Chaoli Wang ◽  
Jun Tao ◽  
Melissa Keranen ◽  
Jun Ma ◽  
...  

2014 ◽  
Vol 40 (1) ◽  
pp. 194-202 ◽  
Author(s):  
Rommel García ◽  
Ignacio Algredo-Badillo ◽  
Miguel Morales-Sandoval ◽  
Claudia Feregrino-Uribe ◽  
René Cumplido

Sign in / Sign up

Export Citation Format

Share Document