Loading [a11y]/accessibility-menu.js
Secure Hashing Algorithms and Their Comparison | IEEE Conference Publication | IEEE Xplore

Secure Hashing Algorithms and Their Comparison


Abstract:

A secure hashing algorithm abbreviated as SHA. SHA uses methodologies similar to those used in MD4 and MD5 to create a cryptic message but has a more complex design. Due ...Show More

Abstract:

A secure hashing algorithm abbreviated as SHA. SHA uses methodologies similar to those used in MD4 and MD5 to create a cryptic message but has a more complex design. Due to its intricate and conservative design, SHA is cryptographically far more ahead in the race in comparison to its predecessors, i.e. MD4 and MD5 making one of its variants to be used in crypto currency transactions. This research paper analyses different SHAs based on various factors and check if one of them could be broken down with the help of backtracking.
Date of Conference: 13-15 March 2019
Date Added to IEEE Xplore: 13 February 2020
ISBN Information:
Conference Location: New Delhi, India

References

References is not available for this document.