A Study of SHA Algorithm in Cryptography

Abstract

Today, security is important on the network. Therefore, the security is provided by the nature of one way functions, which is a key component of SHA Secure Hash Algorithms . The purpose of this paper how to use SHA 256 and SHA 512 from SHA 2 alogrithms. SHA 2 is a family of two similar hash functions with different block sizes known as SHA 256 and SHA 512. They differ in the word size SHA 256 uses 32 bits words where SHA 512 uses 64 bit words. There are also truncated versions of each standard, known as SHA 223, SHA 384, SHA 512 224 and SHA 512 256. These were also designed by the NAS. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "A Study of SHA Algorithm in Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26680.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26680/a-study-of-sha-algorithm-in-cryptography/soe-moe-myint

Authors and Affiliations

Keywords

Related Articles

A Review Ongoing Developments in Sweat Analysis and its Applications

Right now, the clinical utilization of sweat as bio fluid is constrained. The assortment of sweat and its investigation for deciding ethanol, drugs, particles, and metals have been included in this audit article to evalu...

Cooling by using Earthen Pot

Demand for electric power is more in summer is concern for most utilities. However evaporating cooling required more amount of water which is main source as an evaporator, and this only work efficiently when humidity is...

A Review on Solid Oral Dosage Forms with an Industrial Perspective for Process Validation

Aim of the present review is to summarize various steps involved in process validation of the oral solid dosage forms in pharmaceutical industries. Oral solid dosage form such as tablets, capsules etc are widely used due...

Marketing Mix Strategies of Soft Drink Producers in Anambra State, Nigeria

The study aimed to investigate the marketing mix strategies employed by soft drink producers in Anambra State and to assess the impact of such strategies on their performance. Ninety respondents were judgementally select...

A Study of Pilgrimage Tourism with Special Reference to Delta District in Tamil Nadu

A research survey was conducted with a population of 50 samples in all the nine navagraha temples which aimed to identify the overall satisfaction level of the tourist that includes devotees' perception, preferences, sat...

Download PDF file
  • EP ID EP629167
  • DOI 10.31142/ijtsrd26680
  • Views 50
  • Downloads 0

How To Cite

(2019). A Study of SHA Algorithm in Cryptography. International Journal of Trend in Scientific Research and Development, 3(5), 1453-1454. https://europub.co.uk/articles/-A-629167