Research Methodologies - Group3 - V2
Research Methodologies - Group3 - V2
1
The team
Table of
Problem Statement
Objective
Literature Review
contents
Reference
3
Introduction
Data/information is the most valuable asset for the modern electronic communication
system [5]. Data integrity is a fundamental aspect of storage security and reliability. It is
also critical for protecting sensitive information, especially in sectors like healthcare,
Hashing algorithm:
SHA256
MD5
4
Problem Statement
We need a simple and reliable way to check if data has been changed.
Challenges in hashing.
5
Objective
Use SHA256 to generate a unique "digital fingerprint" (hash) to check if data
Data security has become one of the most important issues of concern [3].
To maintain the integrity of the data, it needs to create a mechanism which is called a digital
signature. A digital signature is a specific code which is generated from the function of
In this study the hash type SHA-256 is used because it can be calculated faster with a better
7
level of security [2].
References
[1] H. N. Garcia Martinez, "Exploring secure methods for ensuring data integrity: A theoretical analysis of
cryptographic and detection techniques," M.S. thesis, California State Univ., San Bernardino, CA, USA, 2024.
[2] M. R. Anwar, D. Apriani, and I. R. Adianita, "Hash algorithm in verification of certificate data integrity and
security," Aptisi Transactions on Technopreneurship (ATT), vol. 3, no. 2, pp. 67–74, Sep. 2021.
[3] I. Shingari and S. S. Verma, "Achieving data integrity by forming the digital signature using RSA and SHA-1
algorithm," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 10, no. 5, pp. 26–31, Mar.–Apr. 2013.
[4] D. Rachmawati, J. T. Tarigan, and A. B. C. Ginting, "A comparative study of Message Digest 5 (MD5) and
SHA-256 algorithm," Journal of Physics: Conference Series, vol. 978, no. 1, pp. 012116, Nov. 2018.
[5] C. Biswas, U. Das Gupta, and M. M. Haque, "An efficient algorithm for confidentiality, integrity, and
authentication using hybrid cryptography and steganography," in Proceedings of the 2019 International
Conference on Electrical, Computer and Communication Engineering (ECCE), Chittagong, Bangladesh, Feb.
7–9, 2019
8
9