Demonstration (web-based) of cryptographic hashing

There is a wide spectrum of topics in the field of computer science. One of which is computer security. Computer security has grown increasingly important due to the rise in cybercrime. To provide a complete education with regards to computer science, Nanyang Technological University (NTU) offers...

Full description

Saved in:
Bibliographic Details
Main Author: Lim, Zi Yang
Other Authors: Anwitaman Datta
Format: Final Year Project
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/73949
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-73949
record_format dspace
spelling sg-ntu-dr.10356-739492023-03-03T20:36:22Z Demonstration (web-based) of cryptographic hashing Lim, Zi Yang Anwitaman Datta School of Computer Science and Engineering DRNTU::Library and information science::Cryptography There is a wide spectrum of topics in the field of computer science. One of which is computer security. Computer security has grown increasingly important due to the rise in cybercrime. To provide a complete education with regards to computer science, Nanyang Technological University (NTU) offers a course, CZ/CE4024 Cryptography and Network Security, for students keen in computer security. It covers the fundamentals of cryptography and network security concepts. An area of the topic covered in the module is Secure Hash Algorithm 3 (SHA-3). The algorithm behind SHA-3 is complex and has multiple steps, each unique and serving different purpose. Due to the complexity, students may find it challenging to fully grasp the theory of SHA-3. This project aims to solve this problem. The approach taken to overcome this issue is to implement a web application which visualises each step of SHA-3. Students do not require additional materials when using the demo, built using AngularJS, to learn about SHA-3. The demo provides step-by-step information on how to derive the final output hash from a plaintext message. Bachelor of Engineering (Computer Science) 2018-04-23T01:56:37Z 2018-04-23T01:56:37Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/73949 en Nanyang Technological University 57 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Library and information science::Cryptography
spellingShingle DRNTU::Library and information science::Cryptography
Lim, Zi Yang
Demonstration (web-based) of cryptographic hashing
description There is a wide spectrum of topics in the field of computer science. One of which is computer security. Computer security has grown increasingly important due to the rise in cybercrime. To provide a complete education with regards to computer science, Nanyang Technological University (NTU) offers a course, CZ/CE4024 Cryptography and Network Security, for students keen in computer security. It covers the fundamentals of cryptography and network security concepts. An area of the topic covered in the module is Secure Hash Algorithm 3 (SHA-3). The algorithm behind SHA-3 is complex and has multiple steps, each unique and serving different purpose. Due to the complexity, students may find it challenging to fully grasp the theory of SHA-3. This project aims to solve this problem. The approach taken to overcome this issue is to implement a web application which visualises each step of SHA-3. Students do not require additional materials when using the demo, built using AngularJS, to learn about SHA-3. The demo provides step-by-step information on how to derive the final output hash from a plaintext message.
author2 Anwitaman Datta
author_facet Anwitaman Datta
Lim, Zi Yang
format Final Year Project
author Lim, Zi Yang
author_sort Lim, Zi Yang
title Demonstration (web-based) of cryptographic hashing
title_short Demonstration (web-based) of cryptographic hashing
title_full Demonstration (web-based) of cryptographic hashing
title_fullStr Demonstration (web-based) of cryptographic hashing
title_full_unstemmed Demonstration (web-based) of cryptographic hashing
title_sort demonstration (web-based) of cryptographic hashing
publishDate 2018
url http://hdl.handle.net/10356/73949
_version_ 1759856608042549248