Publication: Springer
Paper Title:
Improvement in SHA-3 Algorithm Using Different Internal Methods & Operations
In this paper, we propose a novel approach to change the internal architecture of schoolbook implementation of SHA-3 algorithm. With this new architecture and internal operations, we aim at decreasing the time taken by the original algorithm. Specifically, we reduce the number of internal rounds of the algorithm, and to compensate for the loss in confusion and diffusion, we make SHA-3’s internal operations more complex. We change the algorithm on its core bit level and make its internal operation more interdependent on the neighbouring bits to achieve more diffusion which results in better confusion.
300+ views
Publication: American Scientific Publishing Group
Paper Title:
A Comprehensive Study on the RFID Technology of Delhi Metro Cards
In this paper, the authors analyze RFID technology, different types of Tags, Readers, and various protocols associated with RFID. We read, write and dump the raw bytes from the MIFARE Classic Card using RC5220 and Arduino Mega. Delhi Metro Card uses MIFARE DESFire. MIFARE DESFire uses 3(DES) for encryption. In this paper, we also read the data structure of the Delhi Metro Card. Additionally, we also compare MIFARE Classic Card and MIFARE DESFire Card.
57k+ views
1.2k+ downloads
Publication: American Scientific Publishing Group
Paper Title:
Exploratory Data Analysis on Username - Password Dataset
Passwords act as a first line of defense against any malicious or unauthorized access to one's personal information. With the increasing digitization, it has now become even more important to choose strong passwords. In this paper, the authors analyze a 100 million Email-Password Database to perform Exploratory Data Analysis. The analysis provides valuable insights on statistics about the most common passwords being used, character set of passwords, most common domains, average length, password strength, frequencies of letters, numbers, symbols (special characters), most common letter, most common number, most common symbol, the ratio of letters, numbers, symbols in passwords which highlights the general trend that users follow while creating passwords. Using the results of this paper, users can make intelligent decisions while creating passwords for themselves, i.e., not opting for the most common features that will help them create robust and less vulnerable passwords.
50k+ views
1k+ downloads