Hashing and data integrity: Reliability of hashing and granularity size reduction

被引:4
|
作者
Malinowski, Christopher [1 ]
Noble, Richard [1 ]
机构
[1] Long Isl Univ, Dept Comp Sci, Greenvale, NY 11548 USA
关键词
MD5; data assurance; data recovery; forensic integrity; hashcode;
D O I
10.1016/j.diin.2007.03.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data assurance have come under scrutiny due to attacks on hashing schemes. This article explores a methodology for increasing the attack difficulty as well as reducing the size of the suspect area in those cases in which assurance is not based on a totality of a file (such as a document in which only a single paragraph may be suspect). (c) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:98 / 104
页数:7
相关论文
共 50 条
  • [1] Data Integrity Mechanism Using Hashing Verification
    Hamamreh, Rushdi A.
    Jamoos, Mohammed A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 94 - 98
  • [2] THE POLAR COORDINATES BASED HASHING FOR DATA DIMENSIONALITY REDUCTION
    Subbotin, S. A.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (04) : 118 - 128
  • [3] IJTAG Integrity Checking with Chained Hashing
    Kan, Senwen
    Dworak, Jennifer
    [J]. 2018 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2018,
  • [4] Practical Integrity Protection with Oblivious Hashing
    Ahmadvand, Mohsen
    Hayrapetyan, Anahit
    Banescu, Sebastian
    Pretschner, Alexander
    [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 40 - 52
  • [5] Hashing for Distributed Data
    Leng, Cong
    Wu, Jiaxiang
    Cheng, Jian
    Zhang, Xi
    Lu, Hanqing
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 37, 2015, 37 : 1642 - 1650
  • [6] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
    Hambouz, Ahmed
    Shaheen, Yousef
    Manna, Abdelrahman
    Al-Fayoumi, Mustafa
    Tedmori, Sara
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
  • [7] Multi-granularity feature learning network for deep hashing
    Feng, Hao
    Wang, Nian
    Tang, Jun
    Chen, Jie
    Chen, Feng
    [J]. NEUROCOMPUTING, 2021, 423 : 274 - 283
  • [8] Hashing methods for temporal data
    Kollios, G
    Tsotras, VJ
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2002, 14 (04) : 902 - 919
  • [9] MAXIMUM SIZE OF A DYNAMIC DATA STRUCTURE - HASHING WITH LAZY DELETION REVISITED
    ALDOUS, D
    HOFRI, M
    SZPANKOWSKI, W
    [J]. SIAM JOURNAL ON COMPUTING, 1992, 21 (04) : 713 - 732
  • [10] Model Size Reduction Using Frequency Based Double Hashing for Recommender Systems
    Zhang, Caojin
    Liu, Yicun
    Xie, Yuanpu
    Ktena, Sofia Ira
    Tejani, Alykhan
    Gupta, Akshay
    Myana, Pranay Kumar
    Dilipkumar, Deepak
    Paul, Suvadip
    Ihara, Ikuhiro
    Upadhyaya, Prasang
    Huszar, Ferenc
    Shi, Wenzhe
    [J]. RECSYS 2020: 14TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2020, : 521 - 526