Review Paper on Secure Hashing Algorithm and Its Variants
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 6)Publication Date: 2014-06-15
Authors : Priyanka Vadhera; Bhumika Lall;
Page : 629-632
Keywords : : SHA-1; SHA-2; SHA-512; message digest; data integrity; message authentication;
Abstract
SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms, but has a more conservative design.SHA appears to provide greater resistance to attacks, supporting the NSA’s assertion that the change increased the security.This is a review paper which includes the comparisons between different secure hashing algorithms.
Other Latest Articles
- Isolation, Biochemical Characterization and Inoculation Effect of Azospirillum on the Growth of Wheat
- Derivation of Einstein Generalized Special Relativity Using Lorentz Transformation
- Cross Border Conflict in Gambella Regional State (from 1991 to 2011): The Traditional Skills, Experiences and Indigenous Knowledge Used by Nuer, Anyuak and Murle Ethnics in Resolving Conflict
- Hardware Modeling of Motion Free Super Resolution
- A Research Article on Data Mining in Addition to Process Mining: Similarities and Dissimilarities
Last modified: 2014-06-24 17:07:24