Analysis and comparison of hash functions in terms of security and performance
Küçük Resim Yok
Tarih
2023
Dergi Başlığı
Dergi ISSN
Cilt Başlığı
Yayıncı
IGI Global
Erişim Hakkı
info:eu-repo/semantics/closedAccess
Özet
Hash functions map data of arbitrary size to fixed-size values, though there are some that support variable length output. The values returned by a hash function are called hash values. Hash functions are used in many fields such as generation of passwords and encryption which are the building blocks of cryptology, digital signatures, data integrity control, crypto storage, and random number generation. However, some hash functions like MD5 and SHA1 are now broken. Using a weak or broken hash function can leave data vulnerable, and thus should not be used. This chapter presents definitions, structures, performances, as well as security vulnerabilities, of hash functions. © 2023, IGI Global. All rights reserved.
Açıklama
Anahtar Kelimeler
[Abstarct Not Available]
Kaynak
Cyber-Physical Systems and Supporting Technologies for Industrial Automation
WoS Q Değeri
Scopus Q Değeri
N/A