An Efficient Approach for Secure Hash Algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. A famous secure hash algorithm given by the National Institute of Standard and Technology (NIST). SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. SHA-1 is very similar to SHA-0, but corrects an error in the original SHA hash specification that led to significant weaknesses. The SHA-0 algorithm was not adopted by many applications. SHA-2 on the other hand significantly differs from the SHA-1 hash function.SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols.
Authors and Affiliations
K. Ramya, K. Suganya
Experimental Study on Comparison of Hooked- End and Crimped Steel Fibres
Fibres are generally used as a common engineering material for crack resistance and strengthening of concrete. Their properties and characteristics greatly influence the properties of concrete which has been proved alre...
Differential Protection of Power Transformer Using Simulink
In this research work we propose a simple and effective technique based on the Clarkâs transformation. Which avoiding the mal-operation of differential protection relays during inrush currents and trip signal generated...
A Novel Modus of Hand Gesture Controlled Wireless Robot
In this Paper we are presenting an accelerometer based hand gesture controlled robot using Atmega8, one of the most basic microcontrollers. To increase the use of robots where conditions are not certain such as fire fig...
Survey on Problems Faced by Students and Role of Academic Advisors
Education is essential for everyone. It is the level of education that helps people earn respect and recognition. The importance of education is undeniable for every single person. It goes without saying that education...
Review of Investigating the strength, Alkali Aggregate reaction and influence of elevated temperature in cement mortar contains Granite powder
Sustainability in Cement mortar Production can be achieved by innovations in substitutions of materials used. Innovations are much needed to meet the increasing demand for new and quality materials. Use of Hazardous Ind...