Title :
Cryptographic Hash Function: A High Level View
Author :
Alkandari, Abdulaziz Ali ; Al-Shaikhli, Imad Fakhri ; Alahmad, M.A.
Author_Institution :
Dept. of Comput., Coll. of Basic Educ., Aladailya, Kuwait
Abstract :
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
Keywords :
cryptography; data integrity; cryptographic hash function; data integrity; fixed bit patterns; information source; sender identity; variable bit pattern; Algorithm design and analysis; Cryptography; Digital signatures; Force; Message authentication; Resistance; SHA-1; SHA-2; SHA-3; attack; classification; construction; cryptographic hash function;
Conference_Titel :
Informatics and Creative Multimedia (ICICM), 2013 International Conference on
Conference_Location :
Kuala Lumpur
DOI :
10.1109/ICICM.2013.29