Back to Search Start Over

Secure hash algorithms and their applications

Authors :
Dubravac, Marko
Grgić, Krešimir
Publication Year :
2022
Publisher :
Sveučilište Josipa Jurja Strossmayera u Osijeku. Fakultet elektrotehnike, računarstva i informacijskih tehnologija Osijek. Zavod za komunikacije. Katedra za radiokomunikacije i telekomunikacije., 2022.

Abstract

U ovom radu je bilo potrebno navesti skupinu kriptografskih hash algoritama SHA, objasniti način rada i njihovu primjenu te izraditi algoritam u programskoj platformi MATLAB. U prvom dijelu rada objašnjena je skupina kriptografskih hash funkcija, kao i način rada SHA skupine algoritama. Naveden je proces izrade svakog algoritma te su uspoređeni. Na kraju se nalazi postupak izrade SHA-256 koristeći MATLAB-u. The goal of this thesis was to explain cryptographic hash functions SHA, explain their way of working and their application and to create algorithm using programming platform MATLAB. In the first part of the thesis, a group of cryptographic hash functions is explained, as well as the working method of the SHA group of algorithms. The process of creating each algorithm is listed and they are compared. Finally, there is a procedure for creating SHA-256 using MATLAB.

Details

Language :
Croatian
Database :
OpenAIRE
Accession number :
edsair.od......3912..375840d07071502146912121e7b64e54