A Fast and Secure Polynomial Hashing Function
Standard NIST Key HASH algorithm SHA-1 was compromised on February 8, 2005. Data integrity and authentication through various means of transmission has been an impeding issue with respect to security. Here we present a system and method of ensuring data integrity that incorporates security features. The method, developed by UTM researchers, is a novel authentication system comprising a hash function wherein the function requires solving at least two problems in order for a collision to occur.
The Technology
This new method of ensuring the integrity of transmitted data uses polynomials over finite fields. The method may be further secured by embedding a KEY.
Type of Offer:
Licensing
« More Software Patents