ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Study of SHA Algorithm in Cryptography

Journal: International Journal of Trend in Scientific Research and Development (Vol.3, No. 5)

Publication Date:

Authors : ;

Page : 1453-1454

Keywords : hash file; SHA-256; SHA-512; John the Ripper tool;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Today, security is important on the network. Therefore, the security is provided by the nature of one way functions, which is a key component of SHA Secure Hash Algorithms . The purpose of this paper how to use SHA 256 and SHA 512 from SHA 2 alogrithms. SHA 2 is a family of two similar hash functions with different block sizes known as SHA 256 and SHA 512. They differ in the word size SHA 256 uses 32 bits words where SHA 512 uses 64 bit words. There are also truncated versions of each standard, known as SHA 223, SHA 384, SHA 512 224 and SHA 512 256. These were also designed by the NAS. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "A Study of SHA Algorithm in Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26680.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26680/a-study-of-sha-algorithm-in-cryptography/soe-moe-myint

Last modified: 2019-09-09 15:00:32