2023
DOI: 10.21608/ijci.2023.208602.1108
|View full text |Cite
|
Sign up to set email alerts
|

Security Evaluation of Different Hashing Functions with RSA for Digital Signature

Abstract: The emergence of the Internet of Things (IoT) represents a significant trend, where integrating IP, data, and wireless technologies onto a single network yields substantial advantages that are both essential and appealing. However, the amalgamation of these entities introduces novel susceptibilities and opportunities for infiltrating IoT networks, thereby necessitating the perpetual advancement of integrated security methodologies. This study investigates the feasibility of utilizing the Rivest-Shamir-Adleman … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…As evidence that the bits appearing on the right side of the decimal point of the number π are random, evaluations are performed on the pixels of an image obtained using the bits on the right side of the decimal point of this number. The parameters used in this work to evaluate randomness are the following: entropy, correlation coefficient or simply correlation, goodness-of-fit test χ 2 and discrete Fourier transform [6][7][8]. As a substantial part of the encryption process, the proposed algorithm applies an S-box 8 × 8, in order to ensure the randomness of the signature [9].…”
Section: Introductionmentioning
confidence: 99%
“…As evidence that the bits appearing on the right side of the decimal point of the number π are random, evaluations are performed on the pixels of an image obtained using the bits on the right side of the decimal point of this number. The parameters used in this work to evaluate randomness are the following: entropy, correlation coefficient or simply correlation, goodness-of-fit test χ 2 and discrete Fourier transform [6][7][8]. As a substantial part of the encryption process, the proposed algorithm applies an S-box 8 × 8, in order to ensure the randomness of the signature [9].…”
Section: Introductionmentioning
confidence: 99%