Article,

A Study of SHA Algorithm in Cryptography

.
International Journal of Trend in Scientific Research and Development, 3 (5): 1453-1454 (August 2019)
DOI: https://doi.org/10.31142/ijtsrd26680

Abstract

Today security is important on the network. Therefore the security is provided by the nature of one way functions which is a key component of SHA Secure Hash Algorithms . The purpose of this paper how to use SHA 256 and SHA 512 from SHA 2 alogrithms. SHA 2 is a family of two similar hash functions with different block sizes known as SHA 256 and SHA 512. They differ in the word size SHA 256 uses 32 bits words where SHA 512 uses 64 bit words. There are also truncated versions of each standard known as SHA 223 SHA 384 SHA 512 224 and SHA 512 256. These were also designed by the NAS. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho Ä Study of SHA Algorithm in Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd) ISSN: 2456-6470 Volume-3 | Issue-5 August 2019 URL: https://www.ijtsrd.com/papers/ijtsrd26680.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26680/a-study-of-sha-algorithm-in-cryptography/soe-moe-myint

Tags

Users

  • @ijtsrd

Comments and Reviews