Please use this identifier to cite or link to this item:
|Title:||Demonstration (web-based) of cryptographic hashing||Authors:||Au, Yun Sheng||Keywords:||DRNTU::Library and information science::Cryptography||Issue Date:||2018||Abstract:||This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. The design phase marks the commencement of the project. Here, I will discuss the adopted software development methodology, choice of programming languages and software tools decided for implementation. Next, in the implementation and methodology phase, I will explain the design considerations and the various steps of the SHA3, including the design choices of the web demonstration. During the testing phase, discussion will focus on various methods of testing validity and verification used to assure the accuracy of the implementation. The problem faced phase of the report is where I will be discussing the problems faced during the implementation, and the solutions employed to overcome the issues. Finally, discourse of any possible future implementations shall conclude this report.||URI:||http://hdl.handle.net/10356/73931||Rights:||Nanyang Technological University||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SCSE Student Reports (FYP/IA/PA/PI)|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.