A Study of SHA Algorithm in Cryptography - International Journal of Trend in Scientific Research and Development

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Friday, 19 July 2019

A Study of SHA Algorithm in Cryptography


Today, security is important on the network. Therefore, the security is provided by the nature of one way functions, which is a key component of SHA Secure Hash Algorithms . The purpose of this paper how to use SHA 256 and SHA 512 from SHA 2 alogrithms. SHA 2 is a family of two similar hash functions with different block sizes known as SHA 256 and SHA 512. They differ in the word size SHA 256 uses 32 bits words where SHA 512 uses 64 bit words. There are also truncated versions of each standard, known as SHA 223, SHA 384, SHA 512 224 and SHA 512 256. These were also designed by the NAS. 


by Soe Moe Myint | Moe Moe Myint | Aye Aye Cho ""A Study of SHA Algorithm in Cryptography"" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd26680.pdf

Paper URL: https://www.ijtsrd.com/computer-science/other/26680/a-study-of-sha-algorithm-in-cryptography/soe-moe-myint

international journal of management, call for paper technology, ugc listed journals

No comments:

Post a Comment

Ad