Thursday 23rd of November 2017
 

Broad View of Cryptographic Hash Functions


Mohammad A. Alahmad and Imad Fakhri Alshaikhli

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.

Keywords: cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3

Download Full-Text


ABOUT THE AUTHORS

Mohammad A. Alahmad
PhD student at International Islamic University of Malaysia

Imad Fakhri Alshaikhli
Professor Assistant


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »