Priyanka Vadhera, Bhumika Lall
Abstract: SHA stands for secure hash algorithm. The four SHA algorithms are structured differently and are named SHA-0; SHA-1; SHA-2; and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms; but has a more conservative design.SHA appears to provide greater resistance to attacks; supporting the NSAs assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.
Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication