doi:10.3850/978-981-08-7301-1_0818
Analyzing and Comparing the Cryptographic Hash Algorithms
T. Lalitha1 and R. Umarani2
1Senior Lecturer, MCA, Sona College of Technology, Salem, Tamilnadu, India.
2Reader, Computer Science, Sri Saradha College for Women, Salem, Tamilnadu, India.
ABSTRACT
Hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. There are currently several different hashing algorithms in use today. These include MD5, SHA-1, and SHA-2, among many others. We use these algorithms for many different purposes – data fingerprinting, digital signatures, and message authentication codes. In these applications, there is one common element – the hashing algorithm takes a piece of data that is likely bigger in size and reduces it to a shorter, “unique” identifier, called a hash.These algorithms and the resulting hash were designed to provide security and confidence to the user that the data is authentic.
Keywords: Computer security, Cryptography, Message digest, Hash function, Hash algorithm, Secure hash standard.
Back to TOC
FULL TEXT(PDF)
|