Downloads: 352 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera [2] | Bhumika Lall [2]
Abstract: SHA stands for secure hash algorithm. The four SHA algorithms are structured differently and are named SHA-0; SHA-1; SHA-2; and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms; but has a more conservative design. SHA appears to provide greater resistance to attacks; supporting the NSAs assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.
Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication
Edition: Volume 3 Issue 6, June 2014,
Pages: 629 - 632
Similar Articles with Keyword 'SHA1'
Downloads: 99
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur | Rajbhupinder Kaur
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2703 - 2708Security to Outsource Data in Community Cloud with the Trusted Tenant System
Kundan Kunal | Dr. Latesh Malik