The addition of the Secure Hash Algorithm SHA-256, the Advanced Encryption Standard AES-128, and dynamic polynomialswitchingintheLinearFeedbackShiftRegistersenhancesthesecurityof stream cipher. Numerous studies concluded that this introduction strengthens the stream cipher's resistance to cryptanalysis. In order to provide a distinct understanding of these designs, this study intends to present a thorough assessment that highlights current attempts to put this concept into practice. The process of creating new designs will be aided by this vision.
A Handbook of Applied Cryptography by Alfred J.Menezes, Paul C. Van Oorschot and Scott A. Vanstone,CRC Press Series on Discrete Mathematics and ItsApplications.
Foundations of Cryptography (Basic Tools) Oded Goldreich Cambridge 2001
F. Al-Shaikhli, M.A.Alahmadand K.Munthir,"Hash Function of Finalist SHA-3: Analysis Study,"Information Technology (IJACSIT), Vol. 2, 2013,StallingsW(2006).
Cryptography & Network Security: Principles & Practices, Pearson Education India.
Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications.
SHA-1 hash function under pressure–Heise Security.
Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1.
Cryptography:A New Dimensionin Computer Data Security; A Guide for the Design and Implementation of Secure Systems, by Carl H. Meyer and Stephen M.Matyas.
Codes and Cryptography, by Dominic Welsh. Oxford, England: Clarendon Press, 1988. 257
Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, Nov.2001
Cite this article
JJesyJanetKumari, SeemaPatil, Shobha T, Bhoomika R, GBhargav Teja, “Pathway For a More Discrete Fintech Application”, Advances in Intelligent Systems and Technologies, pp. 149-157, December. 2022. doi: 10.53759/aist/978-9914-9946-1-2_28