Secured Hash Algorithm-1: Review Paper

Download Now
Provided by: International Journal for Advance Research in Engineering and Technology (IJARET)
Topic: Security
Format: PDF
The Secure Hash Algorithm (SHA) is basically based on the concept of hash function. The basic idea of a hash function is that it takes a variable length message as input and produces a fixed length message as output which can also be called as hash or message-digest. This paper discusses about the Secure Hash Algorithm (SHA). To throw some light on the origins of Secure Hash Algorithm (SHA), the SHA was designed by (NSA) National Security Agency which is a U.S. Federal Information Processing Standard (FIPS) published by the United States (NIST) National Institute of Standards and Technology. SHA has many versions starting from SHA-0 followed by SHA-1, SHA-2 etc.
Download Now

Find By Topic