Visualizing secure hash algorithm (SHA-1) on the web

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptographic hash functions play an important role in modern cryptography. In this paper, we present web-based interactive visualization applets for teaching secure hash algorithm (SHA-1). The visualization applets lead to more efficient learning outcomes. The visualization applets of SHA-1 contain description of SHA-1, animation, and controls for activation with SHA-1. The primary goal of this visualization is to understand the essence of SHA-1 and to be able to find out the strength and weakness of SHA-1. The applets have been used in our department for the course "cryptography" for master students. Most of the students agreed that the applets are helpful to understand SHA-1 and some of its vulnerabilities. The applets can be generalized to SHA-2 and other hash functions. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Nasr, D. B., Bahig, H. M., & Daoud, S. S. (2011). Visualizing secure hash algorithm (SHA-1) on the web. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6890 LNCS, pp. 101–112). https://doi.org/10.1007/978-3-642-23620-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free