A Study of SHA Algorithm in Cryptography
Journal: International Journal of Trend in Scientific Research and Development (Vol.3, No. 5)Publication Date: 2019-15-8
Authors : Soe Moe Myint Moe Moe Myint Aye Aye Cho;
Page : 1453-1454
Keywords : hash file; SHA-256; SHA-512; John the Ripper tool;
Abstract
Today, security is important on the network. Therefore, the security is provided by the nature of one way functions, which is a key component of SHA Secure Hash Algorithms . The purpose of this paper how to use SHA 256 and SHA 512 from SHA 2 alogrithms. SHA 2 is a family of two similar hash functions with different block sizes known as SHA 256 and SHA 512. They differ in the word size SHA 256 uses 32 bits words where SHA 512 uses 64 bit words. There are also truncated versions of each standard, known as SHA 223, SHA 384, SHA 512 224 and SHA 512 256. These were also designed by the NAS. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "A Study of SHA Algorithm in Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26680.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26680/a-study-of-sha-algorithm-in-cryptography/soe-moe-myint
Other Latest Articles
- Preparation and Physical Characterization of Natural Hydroxyapatite from Eggshells
- An Analysis of Benefits and Risks of Artificial Intelligence
- Predition Model for Stock Price on Big Data Analytics
- Performance Analysis of Data Encryption Standard DES
- Analysis of Wind Diesel Hybrid System by Homer Software
Last modified: 2019-09-09 15:00:32