Path: Top -> Journal -> Telkomnika -> 2020 -> Vol 18, No 5, October

A new algorithm for implementing message authentication and integrity in software implementations

Journal from gdlhub / 2021-01-25 09:18:29
By : Alaa Wagih Abdalagader, Israa Ezzat Salem, Haider Rasheed Abdulshaheed, Telkomnika
Created : 2021-01-25, with 1 files

Keyword : authentication integrity; hash functions; validation;
Url : http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/15276
Document Source : web

IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are readily available and freely available because most of the hash functions are faster than their existing radioactive blocks.

Give Comment ?#(0) | Bookmark

PropertyValue
Publisher IDgdlhub
OrganizationTelkomnika
Contact NameHerti Yani, S.Kom
AddressJln. Jenderal Sudirman
CityJambi
RegionJambi
CountryIndonesia
Phone0741-35095
Fax0741-35093
Administrator E-mailelibrarystikom@gmail.com
CKO E-mailelibrarystikom@gmail.com

Print ...

Contributor...

  • , Editor: sukadi

Downnload...