scholarly journals Confidentiality of Data using Hash Function

Author(s):  
K. Ramprakaash ◽  
S. Ramkumar ◽  
R. K. Santhosh ◽  
P. Shanmuga Priya

Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system. In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm. The proposed approach implements an efficient algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. The authentication details of the sender and the receiver is hidden to achieve a secure transmission. The proposed approach provides better integrity and confidentiality. This paper implemented a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting.

2019 ◽  
Vol 9 (1) ◽  
pp. 3681-3684
Author(s):  
R. J. Rasras ◽  
Z. A. AlQadi ◽  
M. R. A. Sara

Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.


Author(s):  
Amin Setiawan Lahagu ◽  
Harvei Desmon Hutahaean

Online book stall is one form of e-commerce in cyberspace, all the time the sale and purchase transactions of books can be done at any time, but along with the development of online transactions, data controls should also be improved. To avoid data from damage caused by irresponsible people, it is necessary to secure data by applying cryptography to the data. In modern times there are many methods or algorithms that can be used to protect and control data from various attacks, but each of these algorithms certainly has its own weaknesses and strengths. The need for long-distance transactions and the importance of data security caused developers to continue to develop cryptography. MD5 algorithm is a one-way hash function that is often used in cryptography, especially in web-based transactions. The MD5 algorithm encodes data in a constant form of 32 bits. All processes from sales and purchase transactions in online bookstores will be safe and durable when the bookstore database is designed in such a way. The book stall database records are encoded with the MD5 algorithm, especially for logging records as a gateway for hackers or hackers to infiltrate. All transactions in the online book kiosk system are detected by the database, the resilience of the database from all attacks is the control of the system from all kinds of damage.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Author(s):  
G. Sridevi Devasena ◽  
S. Kanmani

<p>Wireless Body Area Networks (WBANs) are fundamental technology in health care that permits the information of a patient’s essential body parameters to be gathered by the sensors. However, the safety and concealment defense of the gathered information is a key uncertain problem. A Hybrid Key Management (HKM) scheme [13] is worked based on Public Key Cryptography (PKC)-authentication scheme. This scheme uses a oneway hash function to construct a Merkle Tree. The PKC method increase the computational complexity and lacking scalability. Additionally, it increases expensive computation, communication costs and delay. To overcome this problem, Robust Security for Protected Health Information by ECC with signature Hash Function in WBAN (RSP) is proposed. The system employs hash-chain based key signature technique to achieve efficient, secure transmission from sensor to user in WBAN. Moreover, Elliptical Curve Cryptography algorithm is used to verifies the authenticate sensor. In addition, it describes the experimental results of the proposed system demonstrate the efficient data communication in a network.</p>


2017 ◽  
Vol 4 ◽  
pp. 82-86
Author(s):  
Dawid Górniak ◽  
Piotr Kopniak

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.


Author(s):  
Chin Chen Chang ◽  
Chia Yin Lee ◽  
Chang Chu Chen ◽  
Zhi Hui Wang
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document