Demonstration (web-based) of cryptographic hashing
This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commenc...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/73931 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-73931 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-739312023-03-03T20:44:48Z Demonstration (web-based) of cryptographic hashing Au, Yun Sheng Anwitaman Datta School of Computer Science and Engineering DRNTU::Library and information science::Cryptography This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commencement of the project. Here, I will discuss the adopted software development methodology, choice of programming languages and software tools decided for implementation. Next, in the implementation and methodology phase, I will explain the design considerations and the various steps of the SHA3, including the design choices of the web demonstration. During the testing phase, discussion will focus on various methods of testing validity and verification used to assure the accuracy of the implementation. The problem faced phase of the report is where I will be discussing the problems faced during the implementation, and the solutions employed to overcome the issues. Finally, discourse of any possible future implementations shall conclude this report. Bachelor of Engineering (Computer Science) 2018-04-20T00:54:18Z 2018-04-20T00:54:18Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/73931 en Nanyang Technological University 39 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Library and information science::Cryptography |
spellingShingle |
DRNTU::Library and information science::Cryptography Au, Yun Sheng Demonstration (web-based) of cryptographic hashing |
description |
This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commencement of the project. Here, I will discuss the adopted software development methodology, choice of programming languages and software tools decided for implementation. Next, in the implementation and methodology phase, I will explain the design considerations and the various steps of the SHA3, including the design choices of the web demonstration. During the testing phase, discussion will focus on various methods of testing validity and verification used to assure the accuracy of the implementation. The problem faced phase of the report is where I will be discussing the problems faced during the implementation, and the solutions employed to overcome the issues. Finally, discourse of any possible future implementations shall conclude this report. |
author2 |
Anwitaman Datta |
author_facet |
Anwitaman Datta Au, Yun Sheng |
format |
Final Year Project |
author |
Au, Yun Sheng |
author_sort |
Au, Yun Sheng |
title |
Demonstration (web-based) of cryptographic hashing |
title_short |
Demonstration (web-based) of cryptographic hashing |
title_full |
Demonstration (web-based) of cryptographic hashing |
title_fullStr |
Demonstration (web-based) of cryptographic hashing |
title_full_unstemmed |
Demonstration (web-based) of cryptographic hashing |
title_sort |
demonstration (web-based) of cryptographic hashing |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/73931 |
_version_ |
1759856414053892096 |