• DocumentCode
    668286
  • Title

    Cryptographic Hash Function: A High Level View

  • Author

    Alkandari, Abdulaziz Ali ; Al-Shaikhli, Imad Fakhri ; Alahmad, M.A.

  • Author_Institution
    Dept. of Comput., Coll. of Basic Educ., Aladailya, Kuwait
  • fYear
    2013
  • fDate
    4-6 Sept. 2013
  • Firstpage
    128
  • Lastpage
    134
  • Abstract
    Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
  • Keywords
    cryptography; data integrity; cryptographic hash function; data integrity; fixed bit patterns; information source; sender identity; variable bit pattern; Algorithm design and analysis; Cryptography; Digital signatures; Force; Message authentication; Resistance; SHA-1; SHA-2; SHA-3; attack; classification; construction; cryptographic hash function;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Informatics and Creative Multimedia (ICICM), 2013 International Conference on
  • Conference_Location
    Kuala Lumpur
  • Type

    conf

  • DOI
    10.1109/ICICM.2013.29
  • Filename
    6702796