ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Robust Review of SHA: Featuring Coherent Characteristics

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 2)

Publication Date:

Authors : ;

Page : 111-116

Keywords : Secure Hashing Algorithms (SHA-0; SHA-1; SHA-2); hash functions; Cryptography; Cyber security; Encryption;

Source : Downloadexternal Find it from : Google Scholarexternal


Secure hashing algorithms produces a message digest based on principles similar to those used in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design. The four SHA algorithms are structured differently and are named SHA-0, SHA1, SHA-2, and SHA-3. SHA series appears to provide greater resistance to attacks, supporting the NSA's assertion that the change increased the security. This is a review study which includes the comparisons of different secure hashing algorithms with respect to the attributes that are considered as performance pillars of cyber security systems.

Last modified: 2020-02-29 21:21:07