Real World Applications of MGR, Neeva and KN-Hash

Journal Title: Journal of Applied Computer Science & Mathematics - Year 2018, Vol 12, Issue 25

Abstract

Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started using in almost every branch of information security. Its global approach made us to introduce few more applications in real world. We use MGR [3], Neeva [1] and KN hash [2] functions for this purpose. In this paper, few new applications of hash functions have been addressed which can sustain attacks using classical as well as quantum computers.

Authors and Affiliations

Khushboo BUSSI, Dhananjoy DEY, B. K. DASS

Keywords

Related Articles

Bipolar – Valued Q – Fuzzy Hx Subgroup on an Hx Group

In this paper, we define the algebraic structures of a bipolar Q – fuzzy sub HX group and some related properties are investigated. We also define a bipolar Q – fuzzy normalizer and establish the relation with a bipolar...

Two-dimensional Spectral Approximation

In this article, we propose a two-dimensional polynomial basis which extends Legendre series approximation to bivariate functions. We also present a theoretical study of the stability and the error estimation of the Ta...

Data mining techniques for e-learning

Data Mining (DM), sometimes called Knowledge Discovery in Databases (KDD), is a powerful new technology with great potential to help companies focus on the most important information in the data they have collected via t...

A Method of Forming the Optimal Set of Disjoint Path in Computer Networks

This work provides a short analysis of algorithms of multipath routing. The modified algorithm of formation of the maximum set of not crossed paths taking into account their metrics is offered. Optimization of paths is c...

An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Base...

Download PDF file
  • EP ID EP516651
  • DOI 10.4316/JACSM.201801001
  • Views 200
  • Downloads 0

How To Cite

Khushboo BUSSI, Dhananjoy DEY, B. K. DASS (2018). Real World Applications of MGR, Neeva and KN-Hash. Journal of Applied Computer Science & Mathematics, 12(25), 9-13. https://europub.co.uk./articles/-A-516651