Title :
Implementation and Comparison of Two Hash Algorithms
Author :
Zhenqi Wang ; Lisha Cao
Author_Institution :
Inf. & Network Manage. Center, North China Electr. Power Univ., Baoding, China
Abstract :
MD5 and SHA-1 are the two known Hash Algorithms which are widely applied in information security. They are both developed from MD4. This paper introduces their algorithm logic in detail and their realization using C Language, and compares them through software testing, forms, etc. And finally, we draw a conclusion.
Keywords :
C language; cryptography; file organisation; program testing; C Language; MD4; MD5; SHA-1; algorithm logic; hash algorithms; information security; software testing; Algorithm design and analysis; Cryptography; Registers; Software; Software algorithms; Standards; Hash Algorithm; MD5; SHA-1; compare; the realization using C Language;
Conference_Titel :
Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on
Conference_Location :
Shiyang
DOI :
10.1109/ICCIS.2013.195