Broad View of Cryptographic Hash Functions
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.
Keywords: cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3
Download Full-Text
ABOUT THE AUTHORS
Mohammad A. Alahmad
PhD student at International Islamic University of Malaysia
Imad Fakhri Alshaikhli
Professor Assistant
Mohammad A. Alahmad
PhD student at International Islamic University of Malaysia
Imad Fakhri Alshaikhli
Professor Assistant