Loading

Cryptographic Hash Functions: SHA Family
B. Madhuravani1, D. S. R Murthy2

1B. Madhuravani, Assistant Professor, Department of CSE, MLR Institute of Technology, Dundigal, Hyderabad (Telangana), India.
2Dr. D. S. R. Murthy, Professor, Department of Information Technology, SNIST, Hyderabad (Telangana), India.
Manuscript received on 12 March 2013 | Revised Manuscript received on 21 March 2013 | Manuscript Published on 30 March 2013 | PP: 326-329 | Volume-2 Issue-4, March 2013 | Retrieval Number: D0601032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper gives the Study of Cryptographic Hash functions, which plays a vital role in the Security of many applications such as Digital Signatures, Tamper Detection, Password Protection and so on. We start with reviewing basic fundamentals of hashing. Hash functions are being used as building blocks of many complex Cryptographic mechanisms and protocols. Most of the widespread and popular hash functions, such as MD5, SHA-1 and SHA-2 share a common design philosophy. Recent Cryptanalytic advances have raised serious concerns regarding the long–term security of these hash functions. Security flaws have been detected in some of the most commonly used hash functions like MD5 and SHA-1. Even though the SHA-2 family is not really threatened by any attack, it receives little confidence because it is based on the same design principles. The dedicated hash functions from SHA family – SHA0, SHA-1, SHA-2, SHA-3 are compared in this paper.
Keywords: Hash Function, MD5, SHA-0, SHA-1, SHA-2, SHA-3.

Scope of the Article: Software Defined Networking and Network Function Virtualization