A Comparative Study of Hash Algorithms in Cryptography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 6)Publication Date: 2019-06-30
Authors : Prashant P. Pittalia;
Page : 147-152
Keywords : SHA 1; MD5; Integrity; Hash Algorithm; Cryptography;
Abstract
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature also uses the hash algorithm. Hash function used for key generation in Symmetric and Asymmetric Key Cryptosystems. Different algorithms provide different level of security depending on how difficult is to break them. The most well-known hash algorithms are SHA-1, SHA-2, SHA-3, MD4, MD5 and Whirlpool etc. This paper discusses importance of hash functions, description about various well known hash functions, and comparative analysis of various hash algorithms.
Other Latest Articles
- Les média sociaux dans l’apprentissage : explorer les expériences des étudiants Algériens
- Le dictionnaire, un réservoir éternel pour une liste de mots éphémères The dictionary an eternal repertory for an ephemeral list of words
- The Gender Gap in the Algerian Learners’ Academic Achievements: The Case of the BEM Exam in Bordj Bou Arreridj
- L’analyse de la visée argumentative dans le discours oral de Tariq Ramadan Cas de la conférence La famille : de l’idéal à la réalité ; des étapes, des exigences, un djihad
- Communication Strategies among EFL Learners: Frequency of Use and Type of Strategies
Last modified: 2019-06-26 18:05:29