Blockchain Based Email Communication with SHA-256 Algorithm

被引:1
|
作者
Beevi, L. Sherin [1 ]
Vijayalakshmi, R. [2 ]
Ilampiray, P. [3 ]
Priya, K. Hema [4 ]
机构
[1] RMD Engn Coll, Kavaraipettai, India
[2] Rajalakshmi Inst Technol, Chennai, Tamil Nadu, India
[3] RMK Engn Coll, Chennai, Tamil Nadu, India
[4] Panimalar Inst Technol, Chennai, Tamil Nadu, India
来源
关键词
D O I
10.1007/978-981-19-2541-2_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The cryptocurrency transaction by utilizing bitcoins is the present work scenario in industries with an appealing feature of blockchain technology. Business is increasingly embracing blockchain systems because they make transactions expedite, cost effective, and efficient. Thus, the proposed system aims is to develop a decentralized application to make a secured email transmission using Secured Hash Algorithm(SHA)-256 hashing algorithm. The existing system for Email transmission is the Gmail application. The Gmail is centralized by google company in which all the authorities are at high level and personal data are been centralized and it leads to various security issues. A Decentralized Email Solution on a mission to protect email users' digital rights in a decentralized manner.
引用
收藏
页码:455 / 466
页数:12
相关论文
共 50 条
  • [21] 高速SHA-256算法硬件实现
    陈华锋
    浙江大学学报(理学版), 2009, 36 (06) : 675 - 678
  • [22] Analysis of step-reduced SHA-256
    Mendel, Florian
    Pramstaller, Norbert
    Rechberger, Christian
    Rijmen, Vincent
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 126 - 143
  • [23] Collisions for Step-Reduced SHA-256
    Nikolic, Ivica
    Biryukov, Alex
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 1 - 15
  • [24] Hardware Acceleration of SHA-256 Algorithm using NIOS-II Processor
    Sideris, Argirios
    Sanida, Theodora
    Dasygenis, Minas
    2019 8TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2019,
  • [25] Quantum Collision Attacks on Reduced SHA-256 and SHA-512
    Hosoyamada, Akinori
    Sasaki, Yu
    ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 616 - 646
  • [26] An FPGA Implementation and Comparison of the SHA-256 and Blake-256
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    14TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL & COMPUTER ENGINEERING STA 2013, 2013, : 152 - 157
  • [27] Comparative Study of Sha-256 Optimization Techniques
    Rawal, Bharat S.
    Kumar, Lingampally Shiva
    Maganti, Sriram
    Godha, Varun
    2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 387 - 392
  • [28] Verification of a Cryptographic Primitive: SHA-256 (Abstract)
    Appel, Andrew W.
    ACM SIGPLAN NOTICES, 2015, 50 (06) : 153 - 164
  • [29] Breaking Category Five SPHINCS+ with SHA-256
    Perlner, Ray
    Kelsey, John
    Cooper, David
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 501 - 522
  • [30] An optimized hardware implementation of SHA-256 round computation
    Yao, Maoqun
    Xue, Ziwei
    Li, Haiwei
    Shen, Shanhu
    COMPUTER JOURNAL, 2024,