A Review of Comparative Study of MD5 and SHA Security Algorithm

Security algorithms or cryptography enables secure communication between two parties in the presence of a third-party or an eavesdropper. It assures the recipient of the message of the authenticity of the claimed source, protects the message against the unauthorized release of the message content by the adversaries, limits the access to authorized users, protects against sender/receiver denying sending/receiving a message.MD5 and Security Hash Algorithms (SHA), cryptographic hash algorithms are one-way hashing functions which are easier to compute but are much harder to reverse and would take around millions of years to compute the authentic or veritable message content.

Provided by: International Journal of Computer Applications Topic: Security Date Added: Oct 2014 Format: PDF

Find By Topic