CRYPTOGRAPHIC HASH FUNCTIONS ? A SURVEY
Journal: International Journal OF Engineering Sciences & Management Research (Vol.4, No. 1)Publication Date: 2030-01-17
Authors : Pawan Kumar; Harsh Dev;
Page : 102-108
Keywords : Hash functions; encryption; Digital signature; MD-4; SHA-1; SHA-2; SHA-3 etc;
Abstract
The use of cryptography started from late 1970s and became more prominent in 1980s.Commercial use of cryptograghy started in late 1990s.Many organization started using cryptographic tools for information security but many security challenges were faced by the organizations.The cryptographic designs were having more security flaws.The use of cryptography functions started from MD5 and SHA-1.Now we are going to enter into digital era ,therefore it is very important to discuss the role of cryptographic functions in our day to day activities. Cryptographic functions are used for encryption, digital signatures, secure hashing, message (data) authentication codes, key management, entity authentication, password, and random number generation etc. This paper explains the history of the usage ,design,concept, and the applications of hash functions .
Other Latest Articles
- STATISTICAL RELATION BETWEEN A PUBLIC UNIVERSITY AND A PRIVATE UNIVERSITY BASED ON THE EVALUATION DONE BY THE RESPECTIVE STUDENTS
- REVIEW OF NUMERICAL ANALYSIS OF AEROFOIL SECTION OF BLADE OF AXIAL FLOW FAN
- FAILURE LOAD PREDICTION OF COMPOSITE LAMINATES USING ACOUSTIC EMISSION
- SENTIMENT ANALYSIS OF PRODUCT REVIEWS
Last modified: 2017-01-31 19:19:11