Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814
PDF
- Published Version
Restricted to Repository staff only Download (1MB) | Request a copy |
Abstract
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.
Item Type: | Article (Journal) |
---|---|
Additional Information: | 6534/34636 |
Uncontrolled Keywords: | cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Professor Imad Taha |
Date Deposited: | 20 Jan 2014 09:46 |
Last Modified: | 20 Jan 2014 09:46 |
URI: | http://irep.iium.edu.my/id/eprint/34636 |
Actions (login required)
View Item |