Review Paper on Secure Hashing Algorithm and Its Variants
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 6)Publication Date: 2014-06-15
Authors : Priyanka Vadhera; Bhumika Lall;
Page : 478-482
Keywords : SHA-1; SHA-2; SHA-512; message digest; data integrity; message authentication;
Abstract
SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms, but has a more conservative design.SHA appears to provide greater resistance to attacks, supporting the NSA’s assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.
Other Latest Articles
- Proposing a New Estimation Model Based On Putnam Model
- Estimation of Broken Rotor in Induction Machine Using Spectral Analysis of Instantaneous Power
- A Review on Pharm.D Education in India
- Enhancement of Solubility Characteristics of Alprazolam
- Evaluation of Antibacterial Activity of Ethanolic Extract of Lawsonia Inermis
Last modified: 2014-06-24 14:08:37