Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Academic -- UNF -- Computing; Computer Security; Energy Optimization; Energy Aware Computing

Articles 1 - 1 of 1

Full-Text Articles in Other Computer Engineering

Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish Jan 2015

Towards Designing Energy-Efficient Secure Hashes, Priyanka Dhoopa Harish

UNF Graduate Theses and Dissertations

In computer security, cryptographic algorithms and protocols are required to ensure security of data and applications. This research investigates techniques to reduce the energy consumed by cryptographic hash functions. The specific hash functions considered are Message Digest-2 (MD2), Message Digest-5 (MD5), Secure Hash Algorithm-1 (SHA-1) and Secure Hash Algorithm-2 (SHA-2).

The discussion around energy conservation in handheld devices like laptops and mobile devices is gaining momentum. Research has been done at the hardware and operating system levels to reduce the energy consumed by these devices. However, research on conserving energy at the application level is a new approach. This research …