Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

Implementation of file hashing and verification using HMAC-SHA3

Breadcrumb

  • Home
  • Implementation of file hashing and verification using HMAC-SHA3

Sikirat Damilola Mustapha * and Bharath Kumar Samanthula

School of Computing, College of Science and Mathematics, Montclair State University, Montclair, New Jersey, United States of America.

Review Article
 

International Journal of Science and Research Archive, 2024, 13(02), 3467-3476.
Article DOI: 10.30574/ijsra.2024.13.2.2490
DOI url: https://doi.org/10.30574/ijsra.2024.13.2.2490

Received on 06 November 2024; revised on 14 December 2024; accepted on 16 December 2024

Maintaining file integrity is crucial for security and operational dependability in industries like transportation infrastructure that depend on accurate data. This work introduces a File Integrity Management System (FIMS) that provides tamper-evident digital file verification using Hash-based Message Authentication Codes (HMAC) with SHA-3. This system is implemented in Java and consists of two main programs: VerifyHash compares computed and stored hashes to detect unauthorized file changes, and CreateHash produces and stores unique HMAC-SHA3 hashes for files. In high-security settings where undetected file modifications could jeopardize safety, compliance, and trust, FIMS provides a dependable method to confirm file integrity. The system's strong architecture and focus on data security make it highly applicable to sectors that value data authenticity, highlighting the significance of safe file management procedures.

File Integrity Management; HMAC; SHA-3; Data Integrity Verification; Cryptographic Hashing; Secure File Verification

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2024-2490.pdf

Preview Article PDF

Sikirat Damilola Mustapha and Bharath Kumar Samanthula. Implementation of file hashing and verification using HMAC-SHA3. International Journal of Science and Research Archive, 2024, 13(02), 3467-3476. https://doi.org/10.30574/ijsra.2024.13.2.2490

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution