Rate the Article: Review Paper on Secure Hashing Algorithm and Its Variants, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 354 | Views: 761 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Rating: 6.7 / 10


Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Abstract: SHA stands for secure hash algorithm. The four SHA algorithms are structured differently and are named SHA-0; SHA-1; SHA-2; and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms; but has a more conservative design. SHA appears to provide greater resistance to attacks; supporting the NSAs assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.


Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication


Edition: Volume 3 Issue 6, June 2014,


Pages: 629 - 632



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top