Abstract:
A secure hashing algorithm abbreviated as SHA. SHA uses methodologies similar to those used in MD4 and MD5 to create a cryptic message but has a more complex design. Due ...Show MoreMetadata
Abstract:
A secure hashing algorithm abbreviated as SHA. SHA uses methodologies similar to those used in MD4 and MD5 to create a cryptic message but has a more complex design. Due to its intricate and conservative design, SHA is cryptographically far more ahead in the race in comparison to its predecessors, i.e. MD4 and MD5 making one of its variants to be used in crypto currency transactions. This research paper analyses different SHAs based on various factors and check if one of them could be broken down with the help of backtracking.
Published in: 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)
Date of Conference: 13-15 March 2019
Date Added to IEEE Xplore: 13 February 2020
ISBN Information:
Conference Location: New Delhi, India