International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 217

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 8, August 2015 | Rating: 6.8 / 10


Performance Analysis of Cryptographic Hash Functions

Smriti Gupta | Sandeep Kumar Yadav


Abstract: This paper presents the design and analysis of cryptographic hash functions. A hash function is a map from variable-length input bit strings to fixed-length output bit strings. Despite their simple definition, hash functions play an essential role in a wide area of applications such as digital signature algorithms, message authentication codes, password verification, and key derivation. The main contribution of this paper is to obtain some important parameters for a cryptographic hash function for comparative study. In this paper, we approach the problem of the design and analysis of cryptographic hash functions. We cover the design aspects of some hash functions in this paper and then we are analyzing the result of cryptographic hash functions.


Keywords: Message Digest MDS, Secure Hash Algorithm SHA, Strict Avalanche Criteria SAC, Kolmogorov Smirnov Test, Chi Square Test


Edition: Volume 4 Issue 8, August 2015,


Pages: 864 - 867


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top