Academic Journals Database
Disseminating quality controlled scientific knowledge

Design of Dual Cryptography Encoder

ADD TO MY LIST
 
Author(s): SHAMBHULINGAIAH C. M1 , RAVI SIMHA B. N2 , Dr. M Z KURIAN

Journal: International Journal of Engineering Trends and Technology
ISSN 2231-5381

Volume: 4;
Issue: 7;
Start page: 2918;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Data hiding has been used for thousands of years to transmit data without being intercepted by unwanted viewers | therefore security becomes increasingly important for many applications | such as video surveillance | confidential transmission | military and medical etc. In November 2001 NIST published Rijndael as the proposed Algorithm for AES (Advanced Encryption Standard) | it enhancing the higher level of security by utilizing the strongest 128 bit. AES encryption algorithm is used to encode and authenticate the data. In the year of 2001 | National Security Agency (NSA) was designed and announced SHA stands for Secure Hash Algorithm. SHA 256 is a member of SHA-2 | which is a set of cryptographic hash functions (SHA-224 | SHA-384 | and SHA-512). SHA 256 is a novel hash functions computed with 32-words. But | in the year of 2005 | some security flaws were identified in SHA-1 | so that indicating a stronger hash function would be desirable. Although SHA-256 bears some similarity to the SHA-1 algorithm | these attacks have not been extended to SHA-256. This hash function can be used to encrypt the key | which is better than SHA-1 in terms of performance and security. The goal of design SHA 256 core is to make an implementation more cost efficient.

ABSTRACT
Data hiding has been used for thousands of years to transmit data without being intercepted by unwanted viewers, therefore security becomes increasingly important for many applications, such as video surveillance, confidential transmission, military and medical etc. In November 2001 NIST published Rijndael as the proposed Algorithm for AES (Advanced Encryption Standard), it enhancing the higher level of security by utilizing the strongest 128 bit. AES encryption algorithm is used to encode and authenticate the data. In the year of 2001, National Security Agency (NSA) was designed and announced SHA stands for Secure Hash Algorithm. SHA 256 is a member of SHA-2, which is a set of cryptographic hash functions (SHA-224, SHA-384, and SHA-512). SHA 256 is a novel hash functions computed with 32-words. But, in the year of 2005, some security flaws were identified in SHA-1, so that indicating a stronger hash function would be desirable. Although SHA-256 bears some similarity to the SHA-1 algorithm, these attacks have not been extended to SHA-256. This hash function can be used to encrypt the key, which is better than SHA-1 in terms of performance and security. The goal of design SHA 256 core is to make an implementation more cost efficient.
Save time & money - Smart Internet Solutions     

Tango Rapperswil
Tango Rapperswil