International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 354 | Views: 701 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.7 / 10


     

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Abstract: SHA stands for secure hash algorithm. The four SHA algorithms are structured differently and are named SHA-0; SHA-1; SHA-2; and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms; but has a more conservative design. SHA appears to provide greater resistance to attacks; supporting the NSAs assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.


Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication


Edition: Volume 3 Issue 6, June 2014


Pages: 629 - 632



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Priyanka Vadhera, Bhumika Lall, "Review Paper on Secure Hashing Algorithm and Its Variants", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 629-632, https://www.ijsr.net/getabstract.php?paperid=201418



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 1659 - 1668

Anomaly Detection: Enhancing Systems with Machine Learning

Yogananda Domlur Seetharama

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 1793 - 1802

Event - Driven Architecture: Building Responsive and Scalable Systems

Venkata Naga Sai Kiran Challa

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article



Top