ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.4, No. 3)

Publication Date:

Authors : ; ; ;

Page : 61-67

Keywords : SHA-1; integrity; hash function; LabVIEW; password security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from entering string, padding, SHA-1 core, and message digest to produce 160 bits hash code for any plaintext. From the implementation and simulation results of SHA-1 hash function obtained in LabVIEW project show that simplicity in modelling hashing algorithm, generating hash codes in English plaintext, Arabic plaintext, symbols, and numbers.

Last modified: 2015-03-17 18:35:34