Overview

Abstract

SHA stands for "secure hash algorithm". The four SHA algorithms are structured differently and are named SHA-0, SHA- 1, SHA-2, and SHA-3. Secure hashing algorithm is a method that produces a message digest based on principles similar to those used in the design of the MD4 and MD5message digest algorithms, but has a more conservative design.SHA appears to provide greater resistance to attacks, supporting the NSA's assertion that the change increased the security. This is a review paper which includes the comparisons between different secure hashing algorithms. 

Keywords: SHA-1, SHA-2, SHA-512, message digest, data integrity, message authentication


Source: Priyanka Vadhera, Bhumika Lall, https://www.ijsr.net/archive/v3i6/MDIwMTQxOA==.pdf
Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 License.