- Tytuł:
- Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
- Autorzy:
- Hłobaż, Artur
- Powiązania:
- https://bibliotekanauki.pl/articles/2055243.pdf
- Data publikacji:
- 2022
- Wydawca:
- Polska Akademia Nauk. Czytelnia Czasopism PAN
- Tematy:
-
secure communication
data encryption
data security
secure transmission
secure data exchange method
SDEx method
end-to-end data security - Opis:
- The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA-512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
- Źródło:
-
International Journal of Electronics and Telecommunications; 2022, 68, 1; 57--62
2300-1933 - Pojawia się w:
- International Journal of Electronics and Telecommunications
- Dostawca treści:
- Biblioteka Nauki