IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.4, No. 3)Publication Date: 2015-03-30
Authors : Raaed K. Ibrahim; Ali SH. Hussain; Roula A. Kadhim;
Page : 61-67
Keywords : SHA-1; integrity; hash function; LabVIEW; password security;
Abstract
This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from entering string, padding, SHA-1 core, and message digest to produce 160 bits hash code for any plaintext.
From the implementation and simulation results of SHA-1 hash function obtained in LabVIEW project show that simplicity in modelling hashing algorithm, generating hash codes in English plaintext, Arabic plaintext, symbols, and numbers.
Other Latest Articles
- IDT: MINING DATA STREAMS USING INDETERMINATE DECISION TREE ALGORITHM?
- Nearest Neighbor Query in Location-Aware Mobile Ad-Hoc Network?
- HOLY TRINITY. SUMMARY OF DOGMATIC THEOLOGY SFÂNTA TREIME. SINTEZĂ DE TEOLOGIE DOGMATICĂ
- Prediction of the flash point of ternary ideal mixtures
- Amorphous Phosphate Coatings on Steel Surfaces ? preparation and characterization
Last modified: 2015-03-17 18:35:34