An Efficient Approach for Secure Hash Algorithm

Abstract

Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. A famous secure hash algorithm given by the National Institute of Standard and Technology (NIST). SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA-1, SHA-2, and SHA-3. SHA-1 is very similar to SHA-0, but corrects an error in the original SHA hash specification that led to significant weaknesses. The SHA-0 algorithm was not adopted by many applications. SHA-2 on the other hand significantly differs from the SHA-1 hash function.SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely used applications and protocols.

Authors and Affiliations

K. Ramya, K. Suganya

Keywords

Related Articles

Experimental Study on Comparison of Hooked- End and Crimped Steel Fibres

Fibres are generally used as a common engineering material for crack resistance and strengthening of concrete. Their properties and characteristics greatly influence the properties of concrete which has been proved alre...

Differential Protection of Power Transformer Using Simulink

In this research work we propose a simple and effective technique based on the Clark’s transformation. Which avoiding the mal-operation of differential protection relays during inrush currents and trip signal generated...

A Novel Modus of Hand Gesture Controlled Wireless Robot

In this Paper we are presenting an accelerometer based hand gesture controlled robot using Atmega8, one of the most basic microcontrollers. To increase the use of robots where conditions are not certain such as fire fig...

Survey on Problems Faced by Students and Role of Academic Advisors

Education is essential for everyone. It is the level of education that helps people earn respect and recognition. The importance of education is undeniable for every single person. It goes without saying that education...

Review of Investigating the strength, Alkali Aggregate reaction and influence of elevated temperature in cement mortar contains Granite powder

Sustainability in Cement mortar Production can be achieved by innovations in substitutions of materials used. Innovations are much needed to meet the increasing demand for new and quality materials. Use of Hazardous Ind...

Download PDF file
  • EP ID EP18754
  • DOI -
  • Views 234
  • Downloads 9

How To Cite

K. Ramya, K. Suganya (2014). An Efficient Approach for Secure Hash Algorithm. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://europub.co.uk/articles/-A-18754