hash function

Analysis of the Features of Secure Data Processing in Blockchain Technology Based on an Experimental Transaction Exchange Network

mechanisms for secure exchange of transactions are analyzed. The distributed structure of the blockchain network, built on the basis of a sequence of blocks containing transaction data, is considered. The fundamental features of the blockchain technology are described, as well as the 6-component multilayer blockchain architecture. The importance of using cryptographic hash functions to ensure the security and integrity of data in a blockchain network is shown.

Research and Improvement of Computing Algorithms for Calculating the Trigonometrical Coefficients of the Hashing Algorithm MD5

The paper examines the problems of ensuring the authenticity of messages, as well as analyzes the modern requirements for hash functions and the problems of designing algorithms for calculating hash functions.

Data protection of biometric authentication for remote access to a bank account

This article is devoted to the hash function that provides closure of biometrics in information networks for remote access to client account. There is proposed hash function which is described as a table of numbers. Verification of sustainability of cryptographic hash functions is performed. The session key for the hash is determined by the sequence of biometric data. The protocol of mutual authentication of a client and the server of payment system is given. The number of client’s safe applications to ATM is estimated.