Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Authenticate and Verification Source Files using SHA256 and HMAC Algorithms

Version 1 : Received: 1 July 2024 / Approved: 1 July 2024 / Online: 1 July 2024 (13:13:51 CEST)

How to cite: Uriawan, W.; Ramadita, R.; Putra, R. D.; Siregar, R. I.; Addiva, R. Authenticate and Verification Source Files using SHA256 and HMAC Algorithms. Preprints 2024, 2024070075. https://doi.org/10.20944/preprints202407.0075.v1 Uriawan, W.; Ramadita, R.; Putra, R. D.; Siregar, R. I.; Addiva, R. Authenticate and Verification Source Files using SHA256 and HMAC Algorithms. Preprints 2024, 2024070075. https://doi.org/10.20944/preprints202407.0075.v1

Abstract

Because data authenticity and validity are becoming more and more of a concern in the digital age file security and integrity must be guaranteed. This paper investigates the application of HMAC-SHA256 which combines the Secure Hash Algorithm 256 (SHA256) with a private key for transmission-side source file authentication and verification. The study creates a prototype application to evaluate the efficacy of HMAC-SHA256 in securing file transfers by examining previous investigations on SHA and HMAC. The findings demonstrate that SHA256 produces unique file signatures which successfully guards against unwanted changes. Through the use of cryptographic hashes and secret keys to create distinct digital signatures that guarantee file authenticity HMAC improves security. The study shows that HMAC-SHA256 protects data integrity and detects tampering effectively. It does however stress how crucial it is to comprehend cryptographic concepts and apply these strategies with caution in order to prevent vulnerabilities. Overall the study finds that when properly implemented and updated HMAC-SHA256 greatly enhances file security in the digital age.

Keywords

AES, Cryptography, HMAC, SHA256

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.