A Robust Review of SHA: Featuring Coherent CharacteristicsJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 2)
Publication Date: 2020-02-28
Authors : Ghazala Shaheen;
Page : 111-116
Keywords : Secure Hashing Algorithms (SHA-0; SHA-1; SHA-2); hash functions; Cryptography; Cyber security; Encryption;
Secure hashing algorithms produces a message digest based on principles similar to those used in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design. The four SHA algorithms are structured differently and are named SHA-0, SHA1, SHA-2, and SHA-3. SHA series appears to provide greater resistance to attacks, supporting the NSA's assertion that the change increased the security. This is a review study which includes the comparisons of different secure hashing algorithms with respect to the attributes that are considered as performance pillars of cyber security systems.
Other Latest Articles
Last modified: 2020-02-29 21:21:07