Review Paper on Secure Hashing Algorithm and Its VariantsJournal: International Journal of Science and Research (IJSR) (Vol.3, No. 6)
Publication Date: 2014-06-15
Authors : Priyanka Vadhera; Bhumika Lall;
Page : 478-482
Keywords : SHA-1; SHA-2; SHA-512; message digest; data integrity; message authentication;
SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms, but has a more conservative design.SHA appears to provide greater resistance to attacks, supporting the NSA’s assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.
Other Latest Articles
Last modified: 2014-06-24 14:08:37