• We are available for your help 24/7
  • Email: info@isindexing.com, submission@isindexing.com

Paper Details

A Robust Review of SHA: Featuring Coherent Characteristics

Ghazala Shaheen

Journal Title:International Journal of Computer Science and Mobile Computing - IJCSMC

Secure hashing algorithms produces a message digest based on principles similar to those used in the design of the MD4 and MD5 message digest algorithms, but has a more conservative design. The four SHA algorithms are structured differently and are named SHA-0, SHA1, SHA-2, and SHA-3. SHA series appears to provide greater resistance to attacks, supporting the NSA's assertion that the change increased the security. This is a review study which includes the comparisons of different secure hashing algorithms with respect to the attributes that are considered as performance pillars of cyber security systems.