Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/121965
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2016-11-23T04:32:12Z-
dc.date.available2016-11-23T04:32:12Z-
dc.identifier.urihttp://hdl.handle.net/10603/121965-
dc.description.abstractTechnological advancements and globalization have made faster exchange of newlineinformation a very vital aspect of human life and society. The exponential growth of newlinenetworks, internet, and portable devices have contributed to proliferation of information. newlineWith all this, securing information has become equally important and challenging.1 newlineCryptography in general and Cryptographic Hash Functions in particular are extensively newlineused to accomplish security of information. Cryptographic Hash Functions are crucial in newlineimplementing multiple security goals and have led their way into various security newlineapplications like: digital signatures, storing passwords, digital time stamping, newlineconstructing block ciphers, generating pseudorandom numbers, maintaining secure web newlineconnections, encryption key management, virus scanning, indexing data in hash tables, newlineand detecting accidental data corruption as checksums etc.2 newlineAmong all hash functions being used, those from SHA (Secure Hash Algorithm) newlinefamily covering SHA-0, SHA-1, SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512) newlinehave been the most commonly used ones. This SHA family of functions was developed newlineby National Security Agency (NSA) and certified as Federal Information Processing newlineStandard (FIPS) by National Institute of Standards and Technology (NIST), US newlineDepartment of Commerce. All these are based on MD4 and MD5 algorithms, commonly newlineknown as MDx family of hash functions newline
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleANALYSIS OF SHA 3 FINAL ROUND CANDIDATE ALGORITHMS AND DESIGN OF VARIANT TO SKEIN HASH FAMILY
dc.title.alternative
dc.creator.researcherRajeev Sobti
dc.description.note
dc.contributor.guideDr. G Geetha
dc.publisher.placePhagwara
dc.publisher.universityLovely Professional University
dc.publisher.institutionComputer Application/Computer Science and Engineering
dc.date.registered24/05/2009
dc.date.completed27/10/2016
dc.date.awarded19/11/2016
dc.format.dimensions
dc.format.accompanyingmaterialCD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Computer Application/Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
appendix-1-minicom.pdfAttached File1.15 MBAdobe PDFView/Open
appendix-2-kernel.pdf108.58 kBAdobe PDFView/Open
appendix-3-ccs.pdf816.14 kBAdobe PDFView/Open
appendix-4-iar.pdf569.12 kBAdobe PDFView/Open
appendix-5-ivs.pdf74.84 kBAdobe PDFView/Open
appendix-6-full_diff.pdf318.89 kBAdobe PDFView/Open
appendix-7-test vectors.pdf77.1 kBAdobe PDFView/Open
main document.pdf9.49 MBAdobe PDFView/Open
thesis title page.pdf95.32 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: