1. Secure hash algorithms and their applications
- Author
-
Dubravac, Marko and Grgić, Krešimir
- Subjects
sigurnost podataka ,TECHNICAL SCIENCES. Electrical Engineering. Telecommunications and Informatics ,cryptographic hash functions ,SHA ,TEHNIČKE ZNANOSTI. Elektrotehnika. Telekomunikacije i informatika ,algoritam ,algorithm. integrity ,kriptografska hash funkcija ,data security ,integritet - Abstract
U ovom radu je bilo potrebno navesti skupinu kriptografskih hash algoritama SHA, objasniti način rada i njihovu primjenu te izraditi algoritam u programskoj platformi MATLAB. U prvom dijelu rada objašnjena je skupina kriptografskih hash funkcija, kao i način rada SHA skupine algoritama. Naveden je proces izrade svakog algoritma te su uspoređeni. Na kraju se nalazi postupak izrade SHA-256 koristeći MATLAB-u. The goal of this thesis was to explain cryptographic hash functions SHA, explain their way of working and their application and to create algorithm using programming platform MATLAB. In the first part of the thesis, a group of cryptographic hash functions is explained, as well as the working method of the SHA group of algorithms. The process of creating each algorithm is listed and they are compared. Finally, there is a procedure for creating SHA-256 using MATLAB.
- Published
- 2022