Redundancy of Collisions and Data Repetition A State-of-the-Art AES Algorithms with SHA-512 to Support a High-Integrity IoT Storage
Main Article Content
Abstract
The secure data transmission through the internet is a growing field of work that is vital in streamlining service delivery in modern infrastructure. The study destroys the age-old dilemma of optimization of redundancy in the data security across storage servers that serve data to multiple users and ownership systems. Older hashing algorithms such as MD5 that is prone to collision issues and lack of enough key lengths and vulnerability in sharing keys are often found in conventional methodologies. In order to eliminate these constraints, a new and effective algorithmic method is suggested. This model applies an Advanced AES-based encryption system (which is mentioned in the sources as an Asymmetric Encryption System) to guarantee high-level privacy and security of data. At the same time, SHA-512 is built in to calculate hash, allowing secure detection of files at a faster rate than the older system and redundancy detection through chunking of files on a file-level. The proposed methodology was simulated using MATLAB, and it was shown to work better than the old encryption methods in terms of such parameters as block size, hash output security, and time complexity.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.