Performance Analysis of Cryptographic Hash Functions
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 8)Publication Date: 2015-08-05
Authors : Smriti Gupta; Sandeep Kumar Yadav;
Page : 864-867
Keywords : Message Digest MDS; Secure Hash Algorithm SHA; Strict Avalanche Criteria SAC; Kolmogorov Smirnov Test; Chi Square Test;
Abstract
This paper presents the design and analysis of cryptographic hash functions. A hash function is a map from variable-length input bit strings to fixed-length output bit strings. Despite their simple definition, hash functions play an essential role in a wide area of applications such as digital signature algorithms, message authentication codes, password verification, and key derivation. The main contribution of this paper is to obtain some important parameters for a cryptographic hash function for comparative study. In this paper, we approach the problem of the design and analysis of cryptographic hash functions. We cover the design aspects of some hash functions in this paper and then we are analyzing the result of cryptographic hash functions.
Other Latest Articles
- Achievable Throughput Optimization in Turbo Coded OFDM Systems and its Application to Power Line Networks
- Implementation of LTE Networks in Indian Terrain: Practicality and Throughput Evaluation
- Performance Analysis of LEACH Protocol in Wireless Sensor Network
- Climate Variability and the Associated Impacts on Smallholder Agriculture in Senetwo Location, Kenya
- Assessment of the Extent of Land Degradation in the River Loboi Watershed of Baringo County, Kenya
Last modified: 2021-06-30 21:52:09