Analysis and comparison of hash functions in terms of security and performance

Küçük Resim Yok

Tarih

2023

Dergi Başlığı

Dergi ISSN

Cilt Başlığı

Yayıncı

IGI Global

Erişim Hakkı

info:eu-repo/semantics/closedAccess

Özet

Hash functions map data of arbitrary size to fixed-size values, though there are some that support variable length output. The values returned by a hash function are called hash values. Hash functions are used in many fields such as generation of passwords and encryption which are the building blocks of cryptology, digital signatures, data integrity control, crypto storage, and random number generation. However, some hash functions like MD5 and SHA1 are now broken. Using a weak or broken hash function can leave data vulnerable, and thus should not be used. This chapter presents definitions, structures, performances, as well as security vulnerabilities, of hash functions. © 2023, IGI Global. All rights reserved.

Açıklama

Anahtar Kelimeler

[Abstarct Not Available]

Kaynak

Cyber-Physical Systems and Supporting Technologies for Industrial Automation

WoS Q Değeri

Scopus Q Değeri

N/A

Cilt

Sayı

Künye