Adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador

Moisés Toapanta, Enrique Mafla, Antonio Orizaga

Research output: Contribution to conferenceChapter

Abstract

The Hash security algorithm was analyzed in order to mitigate information security in a distributed architecture. The objective of this research is to develop a prototype for the Adoption of the algorithm Hash in a conceptual model for the Civil Registry of Ecuador. The deductive method was used in order to analyze the published articles that have a direct relation with the research project "Algorithms and Security Protocols for the Civil Registry of Ecuador" and articles related to the Hash security algorithm. It resulted from this research: That the SHA-1 security algorithm is appropriate for use in Ecuador's civil registry; we adopted the SHA-1 algorithm used in the flowchart technique and finally we obtained the adoption of the hash algorithm in a conceptual model. It is concluded that from the comparison of the DM5 and SHA-1 algorithm, it is suggested that in the case of an implementation, the SHA-1 algorithm is taken due to the amount of information and data available from the Civil Registry of Ecuador; It is determined that the SHA-1 algorithm that was defined using the flowchart technique can be modified according to the requirements of each institution; the model for adopting the hash algorithm in a conceptual model is a prototype that can be modified according to all the actors that make up each organization.

Original languageEnglish
DOIs
StatePublished - 24 Apr 2018
EventAIP Conference Proceedings -
Duration: 24 Apr 2018 → …

Conference

ConferenceAIP Conference Proceedings
Period24/04/18 → …

Fingerprint

Dive into the research topics of 'Adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador'. Together they form a unique fingerprint.

Cite this