An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Hi-index | 0.00 |
MD5 and SHA-1 are the most common hash functions used in most security protocols and implementations. However, recent discoveries show that these hash functions are not secure as they should be, which necessitate the need for deploying a new hash function. This implies a number of changes for all major cryptographic protocols. This paper analyzes OpenPGP and SSL/TLS protocols showing all the necessary changes to make the transition to a new hash function.