0% found this document useful (0 votes)
13 views9 pages

Research Methodologies - Group3 - V2

Uploaded by

mentharith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Research Methodologies - Group3 - V2

Uploaded by

mentharith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

RESEARCH METHODOLOGIES

Ensuring Data integrity


Using Secure Hash
Algorithm (SHA256)
PROFESSOR: DR. KHIM CHAMROEUN

1
The team

Seak Sot Men


Chhaynee Sochetra Rithydet

Horn Ho Reth yoeung


Bunhak Chandara Monypong sokheng
2
Introduction

Table of
Problem Statement

Objective

Literature Review
contents
Reference

3
Introduction
Data/information is the most valuable asset for the modern electronic communication

system [5]. Data integrity is a fundamental aspect of storage security and reliability. It is
also critical for protecting sensitive information, especially in sectors like healthcare,

where cloud storage solutions are increasingly prevalent [1].

Hashing algorithm:
SHA256

MD5

4
Problem Statement

Cybersecurity threats are increasing especially data tampering.

It is important to protect data from being changed or altered.

We need a simple and reliable way to check if data has been changed.

Challenges in hashing.

5
Objective
Use SHA256 to generate a unique "digital fingerprint" (hash) to check if data

has been changed.


Learn how hashing works and its role to validate the integrity of data

Understand how SHA algorithms detect even the smallest changes in


data.

Applying the SHA in real-world scenarios


6
Literature Review

Data security has become one of the most important issues of concern [3].

To maintain the integrity of the data, it needs to create a mechanism which is called a digital

signature. A digital signature is a specific code which is generated from the function of

producing a digital signature [4].

In this study the hash type SHA-256 is used because it can be calculated faster with a better
7
level of security [2].
References
[1] H. N. Garcia Martinez, "Exploring secure methods for ensuring data integrity: A theoretical analysis of
cryptographic and detection techniques," M.S. thesis, California State Univ., San Bernardino, CA, USA, 2024.

[2] M. R. Anwar, D. Apriani, and I. R. Adianita, "Hash algorithm in verification of certificate data integrity and
security," Aptisi Transactions on Technopreneurship (ATT), vol. 3, no. 2, pp. 67–74, Sep. 2021.

[3] I. Shingari and S. S. Verma, "Achieving data integrity by forming the digital signature using RSA and SHA-1
algorithm," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 10, no. 5, pp. 26–31, Mar.–Apr. 2013.

[4] D. Rachmawati, J. T. Tarigan, and A. B. C. Ginting, "A comparative study of Message Digest 5 (MD5) and
SHA-256 algorithm," Journal of Physics: Conference Series, vol. 978, no. 1, pp. 012116, Nov. 2018.

[5] C. Biswas, U. Das Gupta, and M. M. Haque, "An efficient algorithm for confidentiality, integrity, and
authentication using hybrid cryptography and steganography," in Proceedings of the 2019 International
Conference on Electrical, Computer and Communication Engineering (ECCE), Chittagong, Bangladesh, Feb.
7–9, 2019
8
9

You might also like