Rochester Institute of Technology RIT Scholar Works Theses 5-2019 Verification of SHA-256 and MD5 Hash Functions Using UVM Dinesh Anand Bashkaran
[email protected] Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Bashkaran, Dinesh Anand, "Verification of SHA-256 and MD5 Hash Functions Using UVM" (2019). Thesis. Rochester Institute of Technology. Accessed from This Master's Project is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact
[email protected]. VERIFICATION OF SHA-256 AND MD5 HASH FUNCTIONS USING UVM by Dinesh Anand Bashkaran GRADUATE PAPER Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE in Electrical Engineering Approved by: Mr. Mark A. Indovina, Lecturer Graduate Research Advisor, Department of Electrical and Microelectronic Engineering Dr. Sohail A. Dianat, Professor Department Head, Department of Electrical and Microelectronic Engineering DEPARTMENT OF ELECTRICAL AND MICROELECTRONIC ENGINEERING KATE GLEASON COLLEGE OF ENGINEERING ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER,NEW YORK MAY 2019 To my family, friends and Professor Mark A. Indovina for all of their endless love, support, and encouragement throughout my career at Rochester Institute of Technology Abstract Data integrity assurance and data origin authentication are important security aspects in com- merce, financial transfer, banking, software, email, data storage, etc. Cryptographic hashfunc- tions specified by the National Institute of Standards and Technology (NIST) provides secure algorithms for data security. Hash functions are designed to digest the data and produce a hash message; a hash is a one-way function which is highly secured and difficult to invert.