A new algorithm for implementing message authentication and integrity in software implementations
Alaa Wagih Abdul Qader, Israa Ezzat Salem, Haider Rasheed Abdulshaheed
Abstract
IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are readily available and freely available because most of the hash functions are faster than their existing radioactive blocks.
Keywords
authentication integrity; hash functions; validation;
DOI:
http://doi.org/10.12928/telkomnika.v18i5.15276
Refbacks
There are currently no refbacks.
This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License .
TELKOMNIKA Telecommunication, Computing, Electronics and Control ISSN: 1693-6930, e-ISSN: 2302-9293Universitas Ahmad Dahlan , 4th Campus Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191 Phone: +62 (274) 563515, 511830, 379418, 371120 Fax: +62 274 564604
<div class="statcounter"><a title="Web Analytics" href="http://statcounter.com/" target="_blank"><img class="statcounter" src="//c.statcounter.com/10241713/0/0b6069be/0/" alt="Web Analytics"></a></div> View TELKOMNIKA Stats