A Fast and Secure Polynomial Hashing Function

Standard NIST Key HASH algorithm SHA-1 was compromised on February 8, 2005. Data integrity and authentication through various means of transmission has been an impeding issue with respect to security. Here we present a system and method of ensuring data integrity that incorporates security features. The method, developed by UTM researchers, is a novel authentication system comprising a hash function wherein the function requires solving at least two problems in order for a collision to occur.

The Technology

This new method of ensuring the integrity of transmitted data uses polynomials over finite fields. The method may be further secured by embedding a KEY.

Type of Offer: Licensing



Next Patent »
« More Software Patents

Share on      


CrowdSell Your Patent