Prathuri Jhansi Rani

  • Citations Per Year
Learn More
Hashing is used as part of IPSec protocol to ensure that the data being sent has not been tampered or corrupted over the virtual private network(VPN). This can be done using SHA1 or MD5. First 96-bits of the message digest of SHA1 or MD5 are used as an authentication field. This paper shows that the Bernoulli keyed hash function can be used to authenticate(More)
  • 1