Close
Login to Your Account
Faadooengineers






F Polls
Loading...
Results 1 to 3 of 3

Thread: Notes for Hash and MAC Algorithms in Cryptography

  1. #1
    Passionate FaaDoO Engineer prasanjeet roy's Avatar
    Join Date
    Jan 2011
    Posts
    286
    Blog Entries
    5

    Gender: : Male

    Branch: : Computer Science Engineering

    Send Private Message
    Send Friend Request

    Ppt 32 Notes for Hash and MAC Algorithms in Cryptography

    Řhave considered:
    lsome current hash algorithms
    •SHA-512 & Whirlpool
    lHMAC authentication using hash function
    lCMAC authentication using a block cipher



    Attached Files for Direct Download
      File Name:
      File Size:
      1.33 MB
    * Click on the 'file icon' or 'file name' to start downloading

  2. #2

    Pdf 32 Cryptography Paper Presentation And Seminar PDF Download

    Cryptography Paper Presentation And Seminar
    In the multimedia steganocryptic system, the message will first be encrypted using public key encryption algorithm, and then this encrypted data will be hidden into an image file thus accomplishing both data encoding and hiding. The multimedia data will be used to provide the cover for the information. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks.

    Although these techniques are often combined together to achieve higher levels of security but still there is a need of a highly secure system to transfer information over any communication media minimizing the threat of intrusion. In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems Visual steganography is one of

    Please find the attached file along with this

    If You have any query regarding the files.Please feel free to ask.I'll be glad to help you.
    Attached Files for Direct Download
      File Name:
      File Size:
      578.0 KB
    * Click on the 'file icon' or 'file name' to start downloading

  3. #3
    Passionate FaaDoO Engineer vrishtisingh's Avatar
    Join Date
    Sep 2011
    Posts
    262
    Blog Entries
    17

    Gender: : Female

    City : Lucknow

    Send Private Message
    Send Friend Request

    Re: Notes for Hash and MAC Algorithms in Cryptography

    Nice matter to study and understand..thanks...

    ---------- Post added at 02:04 PM ---------- Previous post was at 02:04 PM ---------
    Last edited by vrishtisingh; 4th November 2011 at 07:38 PM.
    Vrishti Singh

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •