DSpace Repository

EDIH: Enhancement Data Integrity using Hill Cipher Hash algorithm

Show simple item record

dc.contributor.author Abutaha, Mohammed
dc.contributor.author Hamamreh, Rushdi
dc.date.accessioned 2020-12-09T09:22:58Z
dc.date.accessioned 2022-05-22T08:53:08Z
dc.date.available 2020-12-09T09:22:58Z
dc.date.available 2022-05-22T08:53:08Z
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/8154
dc.description.abstract Nowadays, Cryptography plays a major role in protecting technology applications information. Hash function is a well-defined procedure that converts a large data into a small one, The returned value from hash function is called hash code, It is well known that Hash algorithm works in one way and cannot be reversed, In this paper, The new one way hash algorithm will be designed by using two steps. Firstly, we will convert the input data into matrix system by using all necessary conversions to generate the initial hash value. Secondly, use the output of the first step to make a digest for these data and finally generate the secure hash value.
dc.title EDIH: Enhancement Data Integrity using Hill Cipher Hash algorithm


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account