Sold out

BLAKE Algorithm Evaluation on ARM Processor - Cortex A9, Cortex M3, ARM7TDMI

English · Paperback / Softback

Description

Read more

Cryptographic Hash Algorithms are the backbone of modern security systems as they are used in digital signatures, message authentication codes, and many other security applications to generate message digests. A Cryptographic Hash Function maps a message of any length into a fixed-length hash value, (aka message digest) which serves as the authenticator. Most of the Cryptographic hash algorithms have been broken that includes MD5 and SHA-0. SHA-1 has met many theoretical attacks lately that bring a major threat to SHA-2 and all the security applications that are using SHA-2. NIST announced cryptographic hash functions competition in 2007 for the next family of SHA i.e. SHA-3. The winning algorithm will be named "SHA-3", and will be added to the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. SHA-3 finalist algorithms were open for public comments for one year. My area of work is concentrated on BLAKE algorithm. The analysis given in the book should help the professionals and students to assess the performance of BLAKE on ARM processor platforms: Cortex A9, Cortex M3 and ARM7TDMI.

Product details

Authors Sami Anand, Shilp Chauhan, Shilpa Chauhan, Rajee Sobti, Rajeev Sobti
Publisher LAP Lambert Academic Publishing
 
Languages English
Product format Paperback / Softback
Released 19.10.2012
 
EAN 9783659247781
ISBN 978-3-659-24778-1
No. of pages 68
Subjects Guides
Natural sciences, medicine, IT, technology > IT, data processing > Miscellaneous

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.