Loading

Improve the Integrity of Data Using Hashing Algorithms
P Varaprasada Rao1, S Govinda Rao2, P Chandrasekhar Reddy3, G R Sakthidharan4, Y Manoj Kumar5

1Dr. P Varaprasada Rao, Professor, Department of CSE, Gokaraju Rangaraju Institute of Engineering and Technology (GRIET). Hyderabad (Telangana), India
2Dr. S Govinda Rao, Professor, Department of CSE, Gokaraju Rangaraju Institute of Engineering and Technology (GRIET). Hyderabad (Telangana), India.
3Dr. P Chandrasekhar Reddy, Professor, Department of CSE, Gokaraju Rangaraju Institute of Engineering and Technology (GRIET). Hyderabad (Telangana), India.
4Dr. G R Sakthidharan, Professor, Department of CSE, Gokaraju Rangaraju Institute of Engineering and Technology (GRIET). Hyderabad (Telangana), India.
5Y Manoj Kumar, Assistant Professor, Department of CSE, Gokaraju Rangaraju Institute of Engineering and Technology (GRIET). Hyderabad (Telangana), India.
Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 2018-2023 | Volume-8 Issue-7, May 2019 | Retrieval Number: G6264058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a day with the invention of new technologies communication of information is very fast and quickly sending of information even for long distances is made easy in the world. But this online communication had brought much vulnerability like authenticity and integrity of data. Though there are many cryptographic ciphers, they are vulnerable to different types of attacks. In this paper, the authors focus on different types of attacks and how authenticity and integrity of data is lost. The different algorithms that are used to maintain the authenticity and integrity of data and the comparative study on different algorithms with their vulnerability are considered. The main focus is done with respect to hashing techniques.
Keyword: MD5, SHA, Message Digest, Hash Value, Hashing.
Scope of the Article: Parallel and Distributed Algorithms.