A Robust Review of SHA: Featuring Coherent Characteristics
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 2)Publication Date: 2020-02-28
Authors : Ghazala Shaheen;
Page : 111-116
Keywords : Secure Hashing Algorithms (SHA-0; SHA-1; SHA-2); hash functions; Cryptography; Cyber security; Encryption;
Abstract
Secure hashing algorithms produces a message digest based on principles similar to those used in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design. The four SHA algorithms are structured differently and are named SHA-0, SHA1, SHA-2, and SHA-3. SHA series appears to provide greater resistance to attacks, supporting the NSA's assertion that the change increased the security. This is a review study which includes the comparisons of different secure hashing algorithms with respect to the attributes that are considered as performance pillars of cyber security systems.
Other Latest Articles
- Talking Diary: A Novel Approach for Automatic Audio Note Categorization and Event Scheduling for Android Application
- UNDERSTANDING UNIVERSITY STUDENT'S INTENTION TO USE QUALITY CLOUD STORAGE SERVICES
- ON THE QUALITY AND RELEVANCE OF ENGLISH FOR SPECIFIC PRUPOSES IN HIGHER EDUCATION
- THE CONCEPT OF CLIMATE SMART AGRICULTURE - A CLASSIFICATION IN SUSTAINABLE THEORIES
- CITY CHARACTERISTICS THAT ATTRACT AIRBNB TRAVELLERS: EVIDENCE FROM EUROPE
Last modified: 2020-02-29 21:21:07