Accès libre

A study on the role of hash function in encrypting sensitive information in network security protection

,  et   
11 nov. 2024
À propos de cet article

Citez
Télécharger la couverture

El-kenawy, E. S., Saber, M., & Arnous, R. (2019). An integrated framework to ensure information security over the internet. International Journal of Computer Applications, 975, 8887. Search in Google Scholar

Joshi, C., & Singh, U. K. (2017). Information security risks management framework–A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128-137. Search in Google Scholar

Miloslavskaya, N., & Tolstoy, A. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22, 103-119. Search in Google Scholar

Pachghare, V. K. (2019). Cryptography and information security. PHI Learning Pvt. Ltd.. Search in Google Scholar

Arbanas, K., & Žajdela Hrustek, N. (2019). Key success factors of information systems security. Journal of information and organizational sciences, 43(2), 131-144. Search in Google Scholar

Lundgren, B., & Möller, N. (2019). Defining information security. Science and engineering ethics, 25, 419-441. Search in Google Scholar

Lin, W., Yang, C., Zhang, Z., Xue, X., & Haga, R. (2021). A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data. KSII Transactions on Internet and Information Systems (TIIS), 15(12), 4531-4544. Search in Google Scholar

Dastres, R., & Soori, M. (2021). A review in recent development of network threats and security measures. International Journal of Information Sciences and Computer Engineering. Search in Google Scholar

Yang, Y., Chen, F., Zhang, X., Yu, J., & Zhang, P. (2017). Research on the hash function structures and its application. Wireless Personal Communications, 94, 2969-2985. Search in Google Scholar

Maetouq, A., Daud, S. M., Ahmad, N. A., Maarop, N., Sjarif, N. N. A., & Abas, H. (2018). Comparison of hash function algorithms against attacks: A review. International Journal of Advanced Computer Science and Applications, 9(8). Search in Google Scholar

Wang, Y., Chen, L., Yu, K., & Lu, T. (2022). Image encryption algorithm based on lattice hash function and privacy protection. Multimedia Tools and Applications, 81(13), 18251-18277. Search in Google Scholar

Grassi, L., Khovratovich, D., & Schofnegger, M. (2023, July). Poseidon2: A faster version of the poseidon hash function. In International Conference on Cryptology in Africa (pp. 177-203). Cham: Springer Nature Switzerland. Search in Google Scholar

Mouha, N., Raunak, M. S., Kuhn, D. R., & Kacker, R. (2018). Finding bugs in cryptographic hash function implementations. IEEE transactions on reliability, 67(3), 870-884. Search in Google Scholar

Sabek, I., Vaidya, K., Horn, D., Kipf, A., Mitzenmacher, M., & Kraska, T. (2022). Can Learned Models Replace Hash Functions?. Proceedings of the VLDB Endowment, 16(3). Search in Google Scholar

Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C., Schofnegger, M., & Walch, R. (2022, November). Reinforced concrete: a fast hash function for verifiable computation. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (pp. 1323-1335). Search in Google Scholar

Zaripova, D. A. (2021). Network security issues and effective protection against network attacks. International Journal on Integrated Education, 4(2), 79-85. Search in Google Scholar

Neupane, K., Haddad, R., & Chen, L. (2018, April). Next generation firewall for network security: a survey. In SoutheastCon 2018 (pp. 1-6). IEEE. Search in Google Scholar

Sharma, A. K., & Mittal, S. K. (2019, January). Cryptography & network security hash function applications, attacks and advances: A review. In 2019 Third International Conference on Inventive Systems and Control (ICISC) (pp. 177-188). IEEE. Search in Google Scholar

Hasan, H. A., Al-Layla, H. F., & Ibraheem, F. N. (2022). A review of hash function types and their applications. Wasit Journal of Computer and Mathematics Science, 1(3), 75-88. Search in Google Scholar

Jain, A., & Mangal, N. (2020). Application of stream cipher and hash function in network security. In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018) (pp. 429-435). Springer International Publishing. Search in Google Scholar

Hrytsak, A., Kinzeryavyy, V., Prysiazhnyi, D., Burmak, Y., & Samoylik, Y. (2020). High-Speed and Secure Hash Function for Blockchain Security Mechanisms. Scientific and practical cyber security journal (SPCSJ), 4(1), 65-70. Search in Google Scholar

Xu Dai,Xiaotong Wang,Haotong Han & Erfu Wang. (2024). N-Dimensional Non-Degenerate Chaos Based on Two-Parameter Gain with Application to Hash Function. Electronics(13),2627-2627. Search in Google Scholar

Soo Kyung Eom,Hyang‐Sook Lee & Seongan Lim. (2016). Message Expansion of Homomorphic Encryption Using Product Pairing. ETRI Journal(1),123-132. Search in Google Scholar

Wroński Michał,Kijko Tomasz & Dryło Robert. (2022). High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications. Fundamenta Informaticae(2),107-139. Search in Google Scholar

S Phani Praveen,V Sathiya Suntharam,S Ravi,U. Harita,Venkata Nagaraju Thatha & D Swapna. (2023). A Novel Dual Confusion and Diffusion Approach for Grey Image Encryption using Multiple Chaotic Maps. International Journal of Advanced Computer Science and Applications (IJACSA)(8). Search in Google Scholar

Xiaotong Cui,Hongxin Zhang,Xing Fang,Yuanzhen Wang,Danzhi Wang,Fan Fan & Lei Shu. (2023). A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning. Applied Sciences(21). Search in Google Scholar

Qingjia Luo & Zongfu Zhang. (2023). The Secure Data Transmission Method of a Cellular Communication Network Based on the Asymmetric Encryption Algorithm. Journal of Communications(2). Search in Google Scholar