International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 354

India | Computer Science Engineering | Volume 3 Issue 6, June 2014 | Pages: 629 - 632


Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Abstract: SHA stands for secure hash algorithm. The four SHA algorithms are structured differently and are named SHA-0; SHA-1; SHA-2; and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms; but has a more conservative design. SHA appears to provide greater resistance to attacks; supporting the NSAs assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms.

Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication

How to Cite?: Priyanka Vadhera, Bhumika Lall, "Review Paper on Secure Hashing Algorithm and Its Variants", Volume 3 Issue 6, June 2014, International Journal of Science and Research (IJSR), Pages: 629-632, https://www.ijsr.net/getabstract.php?paperid=201418, DOI: https://dx.doi.org/10.21275/201418


Download Article PDF


Rate This Article!


Top