IIUM Repository

Broad view of cryptographic hash functions

Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814

[img] PDF - Published Version
Restricted to Repository staff only

Download (1MB) | Request a copy

Abstract

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.

Item Type: Article (Journal)
Additional Information: 6534/34636
Uncontrolled Keywords: cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Professor Imad Taha
Date Deposited: 20 Jan 2014 09:46
Last Modified: 20 Jan 2014 09:46
URI: http://irep.iium.edu.my/id/eprint/34636

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year