Review Paper on Secure Hash Algorithm With Its Variants
Keywords:
Hash, SHA, Data integrity, Massage Authentication, Digital Certificate.Abstract
The Cryptographic hash function is produce irreversible and unique hash value. It provides greater resistance against attack .The variants of SHA algorithm are designed differently named are SHA-0, SHA-1, SHA-2, and SHA-3. This is a review paper which includes the comparisons between different secure hashing algorithms.