A Review of Comparative Study of MD5 and SHA Security Algorithm

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
Security algorithms or cryptography enables secure communication between two parties in the presence of a third-party or an eavesdropper. It assures the recipient of the message of the authenticity of the claimed source, protects the message against the unauthorized release of the message content by the adversaries, limits the access to authorized users, protects against sender/receiver denying sending/receiving a message.MD5 and Security Hash Algorithms (SHA), cryptographic hash algorithms are one-way hashing functions which are easier to compute but are much harder to reverse and would take around millions of years to compute the authentic or veritable message content.
Download Now

Find By Topic