{"title":"Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing","authors":"Jaimin Patel","volume":126,"journal":"International Journal of Computer and Information Engineering","pagesStart":753,"pagesEnd":758,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10007314","abstract":"
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.<\/p>\r\n","references":"[1]\tMarc Stevens (June 2012). \"Attacks on Hash Functions and Applications\" - PhD thesis.\r\n[2]\tSchneier on Security\u2013Cryptanalysis of SHA\u20131 http:\/\/www.schneier.com 17th July, 2016.\r\n[3]\tDmitry Khovratovich, Christian Rechberger & Alexandra Savelieva. \"Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family\". IACR Cryptology.\r\n[4]\tNational Institute on Standards and Technology Computer Security Resource Center, NIST's Policy on Hash Functions.\r\n[5]\tDiffie, Whitfield; Hellman, Martin E. \"Exhaustive Cryptanalysis of the NBS Data Encryption Standard\". Computer. 10 (6): pp 74\u201384.\r\n[6]\tKonheim. Computer Security and Cryptography. pp. 301.\r\n[7]\tWilliam E. Burr, \"Data Encryption Standard\", in NIST's anthology \u201cA Century of Excellence in Measurements, Standards, and Technology\u201d: A Chronicle of Selected NBS\/NIST Publications, 1901\u20132000 Link: http:\/\/nvl.nist.gov\/pub\/nistpubs\/sp958-lide\/250-253.pdf - 1st July, 2016.\r\n[8]\tSchneier. Applied Cryptography (1st edition). Page number - 271. Link - https:\/\/www.schneier.com\/books\/applied_cryptography\/1errv159.html\r\n[9]\t\"Efficient software implementation of AES on 32-bit platforms\". Lecture Notes in Computer Science: 2523. 2003.\r\n[10]\tBruce Schneier, AES Announced, October 15, 2000.\r\n[11]\tNikolic, Ivica (2009). \"Distinguisher and Related-Key Attack on the Full AES-256\".Advances in Cryptology \u2013 CRYPTO 2009. Springer Berlin \/ Heidelberg. pp. 231\u2013249.doi: 10.1007\/978-3-642-03356-8_14. ISBN 978-3-642-03355-1.\r\n[12]\tBiham, Eli and Shamir, Adi (1991). \"Differential Cryptanalysis of DES-like Cryptosystems\". Journal of Cryptology. 4 (1): 3\u201372. doi:10.1007\/BF00630563.\r\n[13]\tNew Comparative Study between DES, 3DES and AES within Nine Factors. Journal of computing, volume 2, issue 3, march 2010, issn 2151-9617. Retrieved 2012-12-01. Link - http:\/\/arxiv.org\/pdf\/1003.4085.pdf\r\n[14]\t\"Triple DES Encryption\". IBM. Retrieved 2014-05-17.\r\n[15]\tA Classical introduction to cryptography by Serge Vaudenay - Introduction","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 126, 2017"}