Tuesday 20th of February 2018

Broad View of Cryptographic Hash Functions

Mohammad A. Alahmad and Imad Fakhri Alshaikhli

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.

Keywords: cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3

Download Full-Text


Mohammad A. Alahmad
PhD student at International Islamic University of Malaysia

Imad Fakhri Alshaikhli
Professor Assistant

IJCSI Published Papers Indexed By:





IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »