ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Review Paper on Secure Hashing Algorithm and Its Variants

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 6)

Publication Date:

Authors : ; ;

Page : 478-482

Keywords : SHA-1; SHA-2; SHA-512; message digest; data integrity; message authentication;

Source : Downloadexternal Find it from : Google Scholarexternal


SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms, but has a more conservative design.SHA appears to provide greater resistance to attacks, supporting the NSA’s assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.

Last modified: 2014-06-24 14:08:37