EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY
نویسندگان
چکیده
With the rapid advancement of technologies and proliferation intelligent devices, connecting to internet challenges have grown manifold, such as ensuring communication security keeping user credentials secret. Data integrity privacy become crucial concerns in any ecosystem advanced interconnected communications. Cryptographic hash functions been extensively employed ensure data insecure environments. Hash are also combined with digital signatures offer identity verification mechanisms non-repudiation services. The federal organization National Institute Standards Technology (NIST) established SHA provide optimal performance over some time. most well-known hashing standards SHA-1, SHA-2, SHA-3. This paper discusses background hashing, followed by elaborating on evolution family. main goal is present a comparative analysis these focus their strength, limitations against common attacks. complete assessment was carried out using statistical analysis, extensive fault defined test environment. study outcome showcases issues SHA-1 besides exploring benefits all dominant variants SHA-2 concludes that SHA-3 best option mitigate novice intruders while allowing better cost-effectively.
منابع مشابه
Evolution of Sha-176 Algorithm
To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are the set of cryptographic hash function. There are so many SHA function existing in which SHA-1 produces message digest that is of 160 bits long. Later in SHA-1 has been identified securit...
متن کاملNew Local Collisions for the SHA-2 Hash Family
The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The possible linear approximations of the constituent Boolean functions are considered and certain impossible conditions for such approximations are identified. Based on appropriate approximations, we describe a general me...
متن کاملImplementation of Secure Hash Algorithm Sha-1 by Labview
This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from ente...
متن کاملNon-linear Reduced Round Attacks against SHA-2 Hash Family
Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version of SHA-2 hash functions. Recently, at FSE ’08, an attack against reduced round SHA-256 was presented by Nikolić and Biryukov which used a local collision which is valid for the actual SHA-256 function. It is a 9-step local collision which starts by introducing a mod...
متن کاملInstruction sequence expressions for the secure hash algorithm SHA-256
The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe such instruction sequences for the restrictions to bit strings ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Malaysian Journal of Computer Science
سال: 2022
ISSN: ['0127-9084']
DOI: https://doi.org/10.22452/mjcs.vol35no3.1