Demonstration (web-based) of cryptographic hashing
This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commenc...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/73931 |
_version_ | 1811691953860902912 |
---|---|
author | Au, Yun Sheng |
author2 | Anwitaman Datta |
author_facet | Anwitaman Datta Au, Yun Sheng |
author_sort | Au, Yun Sheng |
collection | NTU |
description | This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commencement of the project. Here, I will discuss the adopted software development methodology, choice of programming languages and software tools decided for implementation. Next, in the implementation and methodology phase, I will explain the design considerations and the various steps of the SHA3, including the design choices of the web demonstration. During the testing phase, discussion will focus on various methods of testing validity and verification used to assure the accuracy of the implementation. The problem faced phase of the report is where I will be discussing the problems faced during the implementation, and the solutions employed to overcome the issues. Finally, discourse of any possible future implementations shall conclude this report. |
first_indexed | 2024-10-01T06:28:05Z |
format | Final Year Project (FYP) |
id | ntu-10356/73931 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T06:28:05Z |
publishDate | 2018 |
record_format | dspace |
spelling | ntu-10356/739312023-03-03T20:44:48Z Demonstration (web-based) of cryptographic hashing Au, Yun Sheng Anwitaman Datta School of Computer Science and Engineering DRNTU::Library and information science::Cryptography This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commencement of the project. Here, I will discuss the adopted software development methodology, choice of programming languages and software tools decided for implementation. Next, in the implementation and methodology phase, I will explain the design considerations and the various steps of the SHA3, including the design choices of the web demonstration. During the testing phase, discussion will focus on various methods of testing validity and verification used to assure the accuracy of the implementation. The problem faced phase of the report is where I will be discussing the problems faced during the implementation, and the solutions employed to overcome the issues. Finally, discourse of any possible future implementations shall conclude this report. Bachelor of Engineering (Computer Science) 2018-04-20T00:54:18Z 2018-04-20T00:54:18Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/73931 en Nanyang Technological University 39 p. application/pdf |
spellingShingle | DRNTU::Library and information science::Cryptography Au, Yun Sheng Demonstration (web-based) of cryptographic hashing |
title | Demonstration (web-based) of cryptographic hashing |
title_full | Demonstration (web-based) of cryptographic hashing |
title_fullStr | Demonstration (web-based) of cryptographic hashing |
title_full_unstemmed | Demonstration (web-based) of cryptographic hashing |
title_short | Demonstration (web-based) of cryptographic hashing |
title_sort | demonstration web based of cryptographic hashing |
topic | DRNTU::Library and information science::Cryptography |
url | http://hdl.handle.net/10356/73931 |
work_keys_str_mv | AT auyunsheng demonstrationwebbasedofcryptographichashing |