MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "c204bfc7-d1d3-4fbe-8274-13cf967da540"}, "_deposit": {"id": "3388", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3388"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3388", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of MDC-2 with AES-hash Function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital signature technology becomes more widely understood and utilized, many countries worldwide are competitively developed their own signature standards for their use and applications. Hash functions are the mathematical algorithms that transform arbitrary length sequences of bits into a hash result of a fixed, limited length. And they are used in many cryptographic protocols. Currently, hash functions based on block cipher used in many of the cryptographic applications. This paper will propose a hash function which is based on AES algorithm and it is the modified version of MDC-2 algorithm to perform efficiently the iteration of compression function for message with huge length."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "hash function"}, {"interim": "AES"}, {"interim": "DES"}, {"interim": "MDC-2"}, {"interim": "message digest"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (205).pdf", "filesize": [{"value": "443 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 443000.0, "url": {"url": "https://meral.edu.mm/record/3388/files/psc2010paper (205).pdf"}, "version_id": "5423f258-c620-40c7-b806-13c64d9f85e2"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myat, Nway Htet"}, {"subitem_authors_fullname": "Win, Myat Su"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1144"}, "item_title": "Implementation of MDC-2 with AES-hash Function", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003388", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3388", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of MDC-2 with AES-hash Function"], "weko_shared_id": -1}
Implementation of MDC-2 with AES-hash Function
http://hdl.handle.net/20.500.12678/0000003388
http://hdl.handle.net/20.500.12678/00000033887b525014-7188-40f6-99e2-eb619e497ebb
c204bfc7-d1d3-4fbe-8274-13cf967da540
Name / File | License | Actions |
---|---|---|
psc2010paper (205).pdf (443 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Implementation of MDC-2 with AES-hash Function | |||||
Language | en | |||||
Publication date | 2010-12-16 | |||||
Authors | ||||||
Myat, Nway Htet | ||||||
Win, Myat Su | ||||||
Description | ||||||
Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital signature technology becomes more widely understood and utilized, many countries worldwide are competitively developed their own signature standards for their use and applications. Hash functions are the mathematical algorithms that transform arbitrary length sequences of bits into a hash result of a fixed, limited length. And they are used in many cryptographic protocols. Currently, hash functions based on block cipher used in many of the cryptographic applications. This paper will propose a hash function which is based on AES algorithm and it is the modified version of MDC-2 algorithm to perform efficiently the iteration of compression function for message with huge length. | ||||||
Keywords | ||||||
hash function, AES, DES, MDC-2, message digest | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1144 | |||||
Journal articles | ||||||
Fifth Local Conference on Parallel and Soft Computing | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |