UCSY's Research Repository

Implementation of MDC-2 with AES-hash Function

Show simple item record

dc.contributor.author Myat, Nway Htet
dc.contributor.author Win, Myat Su
dc.date.accessioned 2019-07-22T07:04:20Z
dc.date.available 2019-07-22T07:04:20Z
dc.date.issued 2010-12-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/1144
dc.description.abstract Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital signature technology becomes more widely understood and utilized, many countries worldwide are competitively developed their own signature standards for their use and applications. Hash functions are the mathematical algorithms that transform arbitrary length sequences of bits into a hash result of a fixed, limited length. And they are used in many cryptographic protocols. Currently, hash functions based on block cipher used in many of the cryptographic applications. This paper will propose a hash function which is based on AES algorithm and it is the modified version of MDC-2 algorithm to perform efficiently the iteration of compression function for message with huge length. en_US
dc.language.iso en en_US
dc.publisher Fifth Local Conference on Parallel and Soft Computing en_US
dc.subject hash function en_US
dc.subject AES en_US
dc.subject DES en_US
dc.subject MDC-2 en_US
dc.subject message digest en_US
dc.title Implementation of MDC-2 with AES-hash Function en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics