Generalised Quantum Hash Function and Secure One-Way Data Transmission

Author(s):  
С.В. Зуев ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Jinhua Fu ◽  
Sihai Qiao ◽  
Yongzhong Huang ◽  
Xueming Si ◽  
Bin Li ◽  
...  

Blockchain is widely used in encrypted currency, Internet of Things (IoT), supply chain finance, data sharing, and other fields. However, there are security problems in blockchains to varying degrees. As an important component of blockchain, hash function has relatively low computational efficiency. Therefore, this paper proposes a new scheme to optimize the blockchain hashing algorithm based on PRCA (Proactive Reconfigurable Computing Architecture). In order to improve the calculation performance of hashing function, the paper realizes the pipeline hashing algorithm and optimizes the efficiency of communication facilities and network data transmission by combining blockchains with mimic computers. Meanwhile, to ensure the security of data information, this paper chooses lightweight hashing algorithm to do multiple hashing and transforms the hash algorithm structure as well. The experimental results show that the scheme given in the paper not only improves the security of blockchains but also improves the efficiency of data processing.


2016 ◽  
Vol 37 (1) ◽  
pp. 231-252
Author(s):  
Marcin Bednarek ◽  
Tadeusz Dąbrowski ◽  
Tomasz Wawer

Abstract Communication between the process stations of the distributed control system is carried out. By the supervision and therapeutic systems of the stations communication process diagnosis is performed. Supervision and therapeutic systems are responsible for the security of transmitted data. The security is considered in this article mainly in the aspect of resistance to external destructive factors on the data transmission process. It is assumed that the transmission security can be provided by mechanisms protecting the integrity of the transmitted data. Correctness of the data is controlled by using one-way hash function calculated on the basis of the transmitted value variable and also is attached to the transmitted data. This allows to maintain the integrity of the transmitted process data. A solutions using one-way hash function to protection of the transmission before changing message contents (caused by eg. intruder interference) are proposed in the article.


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


2020 ◽  
pp. 61-71
Author(s):  
K. Shankar ◽  

The security with the protection of IoT is to stay a consequential test, for the most part, because of the huge scale and dispersed nature of IoT systems. A cloud server brings wide pertinence of IoT in numerous businesses just as Government parts. Be that as it may, the security concerns, for example, verification and information protection of these gadgets assume a key job in fruitful coordination of two innovations. To build the security here, a quantum hash work system and hybrid cuckoo search-Artificial Bee Colony algorithm is displayed. A quantum hash work has been presented as an amazing system for secure correspondence of IoT and cloud because of its irregular disordered robust execution, greater affectability for introductory authority dimension, steadiness, and the exceptionally huge crucial area is hypothetically sufficiently able to oppose different known assaults. Cloud servers utilizing CS-ABC to upgrading the safe calculations through a quantum channel inside the cloud framework. Execution examinations and recreation outcomes demonstrate our presented methods are portrayed and also have greater safety, proficiency with strength opposed to a few surely understood assaults which choose them as a great contender for verifying cloud and IoT applications.


2019 ◽  
Vol 59 (2) ◽  
pp. 635-648
Author(s):  
Yalan Wang ◽  
Yuling Chen ◽  
Zhanhong Wei ◽  
Haseeb Ahmad

2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Dan Li ◽  
Yu-Guang Yang ◽  
Jing-Lin Bi ◽  
Jia-Bin Yuan ◽  
Juan Xu

Sign in / Sign up

Export Citation Format

Share Document