Analysis and comparison of hash functions in terms of security and performance

dc.authorscopusid58596800700
dc.authorscopusid48862103700
dc.contributor.authorÖzer O.
dc.contributor.authorTuna G.
dc.date.accessioned2024-06-12T10:26:15Z
dc.date.available2024-06-12T10:26:15Z
dc.date.issued2023
dc.description.abstractHash functions map data of arbitrary size to fixed-size values, though there are some that support variable length output. The values returned by a hash function are called hash values. Hash functions are used in many fields such as generation of passwords and encryption which are the building blocks of cryptology, digital signatures, data integrity control, crypto storage, and random number generation. However, some hash functions like MD5 and SHA1 are now broken. Using a weak or broken hash function can leave data vulnerable, and thus should not be used. This chapter presents definitions, structures, performances, as well as security vulnerabilities, of hash functions. © 2023, IGI Global. All rights reserved.en_US
dc.identifier.doi10.4018/978-1-6684-9267-3.ch004
dc.identifier.endpage89en_US
dc.identifier.isbn9781668492680
dc.identifier.isbn9781668492673
dc.identifier.scopus2-s2.0-85171503781en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage64en_US
dc.identifier.urihttps://doi.org/10.4018/978-1-6684-9267-3.ch004
dc.identifier.urihttps://hdl.handle.net/20.500.14551/16747
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.relation.ispartofCyber-Physical Systems and Supporting Technologies for Industrial Automationen_US
dc.relation.publicationcategoryKitap Bölümü - Uluslararasıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subject[Abstarct Not Available]en_US
dc.titleAnalysis and comparison of hash functions in terms of security and performanceen_US
dc.typeBook Chapteren_US

Dosyalar