Close
Login to Your Account
Faadooengineers

Results 1 to 3 of 3

Thread: Notes for Hash and MAC Algorithms in Cryptography

  1. #1

    Ppt 32 Notes for Hash and MAC Algorithms in Cryptography

    Řhave considered:
    lsome current hash algorithms
    •SHA-512 & Whirlpool
    lHMAC authentication using hash function
    lCMAC authentication using a block cipher



    Attached Files for Direct Download
      File Name:
      File Size:
      1.33 MB
      Total Downloads:
      675
    * Click on the 'file icon' or 'file name' to start downloading
    Er. Prasanjeet Roy
    Graphics & Web-Designer
    www.way2
    www.in


  2. #2

    Pdf 32 Cryptography Paper Presentation And Seminar PDF Download

    Cryptography Paper Presentation And Seminar
    In the multimedia steganocryptic system, the message will first be encrypted using public key encryption algorithm, and then this encrypted data will be hidden into an image file thus accomplishing both data encoding and hiding. The multimedia data will be used to provide the cover for the information. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks.

    Although these techniques are often combined together to achieve higher levels of security but still there is a need of a highly secure system to transfer information over any communication media minimizing the threat of intrusion. In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems Visual steganography is one of

    Please find the attached file along with this

    If You have any query regarding the files.Please feel free to ask.I'll be glad to help you.
    Attached Files for Direct Download
      File Name:
      File Size:
      578.0 KB
      Total Downloads:
      81
    * Click on the 'file icon' or 'file name' to start downloading

  3. #3

    Re: Notes for Hash and MAC Algorithms in Cryptography

    Nice matter to study and understand..thanks...

    ---------- Post added at 02:04 PM ---------- Previous post was at 02:04 PM ---------
    Last edited by vrishtisingh; 4th November 2011 at 02:08 PM.
    Vrishti Singh

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Share anywhere and get download.

50%