Blockchain Based Email Communication with SHA-256 Algorithm

被引:1
|
作者
Beevi, L. Sherin [1 ]
Vijayalakshmi, R. [2 ]
Ilampiray, P. [3 ]
Priya, K. Hema [4 ]
机构
[1] RMD Engn Coll, Kavaraipettai, India
[2] Rajalakshmi Inst Technol, Chennai, Tamil Nadu, India
[3] RMK Engn Coll, Chennai, Tamil Nadu, India
[4] Panimalar Inst Technol, Chennai, Tamil Nadu, India
来源
关键词
D O I
10.1007/978-981-19-2541-2_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The cryptocurrency transaction by utilizing bitcoins is the present work scenario in industries with an appealing feature of blockchain technology. Business is increasingly embracing blockchain systems because they make transactions expedite, cost effective, and efficient. Thus, the proposed system aims is to develop a decentralized application to make a secured email transmission using Secured Hash Algorithm(SHA)-256 hashing algorithm. The existing system for Email transmission is the Gmail application. The Gmail is centralized by google company in which all the authorities are at high level and personal data are been centralized and it leads to various security issues. A Decentralized Email Solution on a mission to protect email users' digital rights in a decentralized manner.
引用
收藏
页码:455 / 466
页数:12
相关论文
共 50 条
  • [31] Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs
    Ahmad, I
    Das, AS
    COMPUTERS & ELECTRICAL ENGINEERING, 2005, 31 (06) : 345 - 360
  • [32] 基于FPGA的SHA-256算法实现
    杨晓辉
    戴紫彬
    微计算机信息, 2006, (11) : 146 - 148
  • [33] Threshold Implementations in Industry: A Case Study on SHA-256
    Hutter, Michael
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 37 - 37
  • [34] Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL
    Bensalem, Hachem
    Blaquiere, Yves
    Savaria, Yvon
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [35] An Optimized Pipelined Architecture of SHA-256 Hash Function
    Padhi, Meelu
    Chaudhari, Ravindra
    2017 7TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED), 2017,
  • [36] VLSI Implementation of High-speed SHA-256
    Bai, Ling
    Li, Shuguo
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 131 - +
  • [37] Design of High-Throughput SHA-256 Hash Function based on FPGA
    Suhaili, Shamsiah Binti
    Watanabe, Takahiro
    PROCEEDINGS OF THE 2017 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI'17), 2017,
  • [38] HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256
    Kammoun, Manel
    Elleuchi, Manel
    Abid, Mohamed
    Obeid, Abdulfattah M.
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2021, 17 (02) : 87 - 96
  • [39] Second-Order Differential Collisions for Reduced SHA-256
    Biryukov, Alex
    Lamberger, Mario
    Mendel, Florian
    Nikolic, Ivica
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 270 - +
  • [40] The Evaluation Report of SHA-256 Crypt Analysis Hash Function
    Selvakumar, A. Arul Lawrence
    Ganandhas, C. Suresh
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 588 - +