Review Paper on Secure Hash Algorithm With Its Variants

Authors

  • Aradhana Research Scholar in Dr. C.V. Raman University Bilaspur
  • Dr. S. M. Ghosh Professor in Dr. C.V. Raman University Bilaspur

Keywords:

Hash, SHA, Data integrity, Massage Authentication, Digital Certificate.

Abstract

The Cryptographic hash function is produce irreversible and unique hash value. It provides greater resistance against attack .The variants of SHA algorithm are designed differently named are SHA-0, SHA-1, SHA-2, and SHA-3. This is a review paper which includes the comparisons between different secure hashing algorithms.

Downloads

Published

2021-11-07

How to Cite

Aradhana, & M. Ghosh, D. S. (2021). Review Paper on Secure Hash Algorithm With Its Variants. International Journal of Technical Innovation in Modern Engineering & Science, 3(5), 01–07. Retrieved from https://ijtimes.com/index.php/ijtimes/article/view/1055