[PDF][PDF] Modified SHA-1 algorithm

RL Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
… [29] that indicates that the bit-difference of SHA-192 is lower than SHA-160. This approach
might … RESULTS AND ANALYSIS For performance analysis, we consider different messages …

Implementation and Performance Analysis of Enhanced SHA-192

Harshita, S Tanwar - Proceedings of the International Conference on …, 2016 - Springer
… In this paper, modified SHA-192 is implemented having a … SHA-192 which uses the concept
of both SHA-192 and MD5 proposed by [3]. Later, we are comparing it with SHA-1 and SHA-…

[PDF][PDF] COMPARATIVE ANALYSIS OF CRYPTOGRAPHIC HASH FUNCTION FOR ADVANCEMENT OF NETWORK SECURITY

S KUMAR, DRP TYAGI - conference.iardo.com
… cryptographic hash algorithm which produces a message review of … To check the efficiency
and strength of these algorithms, … of SHA-1 and SHA-192[2] are more robust than SHA-192[1]. …

[PDF][PDF] Cryptographic Hash Algorithms Performance Finding using. Net Simulation

B Nithya, P Sripriya - International Journal of Computing Algorithm, 2016 - academia.edu
… Another study5 was on SHA-1, SHA-192[1], SHA-192[… SHA-1, SHA- 256, SHA-384, SHA-512
are picked and showed the differences by means of speed, throughput and memory. SHA-1

Cryptography & network security hash function applications, attacks and advances: A review

AK Sharma, SK Mittal - 2019 Third International Conference on …, 2019 - ieeexplore.ieee.org
Efficiency always improved if we’re signing a … SHA attacks such as ‘preimage’, ‘second
pre-image’ and ‘collision’ attacks etc. Security analysis of SHA-192 is already compared to SHA-1

Robustness and security enhancement of SHA with modified message digest and larger bit difference

S Verma, GS Prajapati - … Symposium on Colossal Data Analysis …, 2016 - ieeexplore.ieee.org
… proposed their own algorithms for the same such as SHA-192. … existing algorithms is its time
efficiency and its robustness. … Number of rounds in Proposed SHA is same as that of SHA-1.…

[PDF][PDF] Hashing Key Based Analysis of Polynomial Encryption Standard

P Sonia, SK Grewal - … Journal of Computer Network and Information …, 2016 - mecs-press.net
… [12] have reviewed the performance analysis of SHA algorithms (SHA-1 and SHA-192).
There are many secure hash algorithms are available. All these …

QR code integrity verification based on modified SHA-1 algorithm

RL Quilala, AM Sison… - Indonesian Journal of …, 2018 - section.iaesonline.com
… Secure Hash Algorithm 1 (SHA-1) is a cryptographic hash … SHA-1 is considered the most
widely used hash algorithm in a vast range of applications [17], [23], [24] due to its time efficiency

Improved MSHA-1 algorithm with mixing method

RL Quilala, TFG Quilala - Bulletin of Electrical Engineering and Informatics, 2021 - beei.org
performance over SHA-1. However, the study showed that MSHA-1 hashing time performance
was … Message sets For performance analysis, the study considered different message sets …

[PDF][PDF] Empirical evaluation of data hashing algorithms for password checks in PHP webapps using salt and pepper

OO Ajayi, TF Fanala - Comput Inf Syst Dev Inf Allied Res J, 2017 - academia.edu
… The security analysis of the SHA-192 is compared to the old … Majoring on MD5 and SHA-1,
the evaluation result shows … data hashing algorithms methodology were reviewed to ascertain …