Please use this identifier to cite or link to this item:
Title: Demonstration (web-based) of cryptographic hashing
Authors: Au, Yun Sheng
Keywords: DRNTU::Library and information science::Cryptography
Issue Date: 2018
Abstract: This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commencement of the project. Here, I will discuss the adopted software development methodology, choice of programming languages and software tools decided for implementation. Next, in the implementation and methodology phase, I will explain the design considerations and the various steps of the SHA3, including the design choices of the web demonstration. During the testing phase, discussion will focus on various methods of testing validity and verification used to assure the accuracy of the implementation. The problem faced phase of the report is where I will be discussing the problems faced during the implementation, and the solutions employed to overcome the issues. Finally, discourse of any possible future implementations shall conclude this report.
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
  Restricted Access
Final Year Report2.46 MBAdobe PDFView/Open

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.