DocumentCode :
1844092
Title :
Implementation and Comparison of Two Hash Algorithms
Author :
Zhenqi Wang ; Lisha Cao
Author_Institution :
Inf. & Network Manage. Center, North China Electr. Power Univ., Baoding, China
fYear :
2013
fDate :
21-23 June 2013
Firstpage :
721
Lastpage :
725
Abstract :
MD5 and SHA-1 are the two known Hash Algorithms which are widely applied in information security. They are both developed from MD4. This paper introduces their algorithm logic in detail and their realization using C Language, and compares them through software testing, forms, etc. And finally, we draw a conclusion.
Keywords :
C language; cryptography; file organisation; program testing; C Language; MD4; MD5; SHA-1; algorithm logic; hash algorithms; information security; software testing; Algorithm design and analysis; Cryptography; Registers; Software; Software algorithms; Standards; Hash Algorithm; MD5; SHA-1; compare; the realization using C Language;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on
Conference_Location :
Shiyang
Type :
conf
DOI :
10.1109/ICCIS.2013.195
Filename :
6643111
Link To Document :
بازگشت