Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

Download Now
Provided by: IJCTT-International Journal of Computer Trends and Technology
Topic: Security
Format: PDF
A hash function is a function that takes a relatively arbitrary amount of input and produces an output of fixed size. In this paper the authors provide an understandable knowledge about cryptographic techniques. This paper deals with various message authentication codes, hash functions and encryption techniques and provides in-depth analysis of these techniques. This paper also provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.
Download Now

Find By Topic