Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
SHA stands for secure hash algorithm. The four SHA algorithms are structured differently and are named SHA-0; SHA-1; SHA-2; and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms; but has a more conservative design.SHA appears to provide greater resistance to attacks; supporting the NSAs assertion that the change increased the security.This is a review paper which includes the comparisons between different secure hashing algorithms.
Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication
Edition: Volume 3 Issue 6, June 2014
Pages: 629 - 632
How to Cite this Article?
Priyanka Vadhera, Bhumika Lall, "Review Paper on Secure Hashing Algorithm and Its Variants", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201418, Volume 3 Issue 6, June 2014, 629 - 632
263 PDF Views | 310 PDF Downloads
Similar Articles with Keyword 'SHA-1'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2885 - 2889An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud
Kirti Panmand, Sandeep Kadam
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1886 - 1889Deduplication Using SHA-1 and IBE with Modified AES
Renuka C. Deshpande, S. S. Ponde
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019
Pages: 1579 - 1582Enhancing Security and Speed of Sha-192 with Higher Avalanche
Sushama Ingale, Arun Jhapate
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 478 - 482Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 149 - 153Evading Flooding Attack in MANET Using Node Authentication
Anup A. Wanjari, Vidya Dhamdhere
Similar Articles with Keyword 'SHA-2'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 478 - 482Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Similar Articles with Keyword 'SHA-512'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2469 - 2473High Security of Data Using Steganography with Hybrid Algorithm
Madhugeeta Verma, Poonam Dhamal
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 478 - 482Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 680 - 683Secure Image Based One Time Password
Neha Vishwakarma, Kopal Gangrade
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Similar Articles with Keyword 'message digest'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2224 - 2226Crypt Analyzing of Message Digest Algorithms MD5 Using Quadratic Salt
Pradeep Singh Solanki, Vinit Agarwal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 632 - 634Avoidance of Sensitive Data Exposure in Intramail System Using MD5 Algorithm
Jissmol T Antony, Gopal B
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 1201 - 1208An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks
Sindu.B, S. Sathya Priya
Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019
Pages: 1579 - 1582Enhancing Security and Speed of Sha-192 with Higher Avalanche
Sushama Ingale, Arun Jhapate
Similar Articles with Keyword 'data integrity'
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1251 - 1256IT Auditing and its Standards
Dr D S Kushwaha, Ankur Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1989 - 1992Privacy-Preservation and Public Auditing for Cloud Data - A Survey
S Archana, Ananthi J
Similar Articles with Keyword 'message authentication'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1065 - 1068Survey Paper on Pervasive Computing for Mobile Security
Kulashree Joshi, Sulochana Sonkamble
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1604 - 1610A Novel Model for S.M.S Security and SPAM Detection
Nikhila Zalpuri
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2213 - 2217Public Key Cryptography based Secured Dynamic Routing in VANET Time Stamp based Key Management System
Shruti Bandak, Rekha Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2334 - 2337Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
Priya T V, Sreerag B M