Cryptography is the art of providing security to the message .It gives freedom to the user from hacking of the original message. The here are multiple techniques to provide cryptographic security to the message but this paper focus on the SHA-256 hash function and its extended proposed model SHA-288 for better security. The basic structure of maximum hash functions is based on the Merkle- Damgard construction. Most of the hash functions are used for information security purposes such as digital signature, password authentication; message authentication etc.The hash algorithms perform security checks over plain text by converting plain text into cipher text called message digest or checksums. The paper explains about the cryptanalysis and de...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
Cryptographic hash functions are an important building block for a wide range of applications such a...
Crypto graphic hash functions are an important building block for a wide range of applications such ...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
The objective of this paper is to design a new secure hash algorithm with final hash code length 512...
The hash function is the most important cryptographic primitive function and is an integral part of ...
Hash functions are cryptographic tools that are used in various applications like digital signature,...
The objective of this paper is to design a new secure hash algorithm with final hash code length 512...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Hash functions play an important role in a branch of information secret. The hash algorithm provides...
Cryptographic hash function is an important cryptographic tool in the field of information security....
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
Cryptographic hash functions are an important building block for a wide range of applications such a...
Crypto graphic hash functions are an important building block for a wide range of applications such ...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
The objective of this paper is to design a new secure hash algorithm with final hash code length 512...
The hash function is the most important cryptographic primitive function and is an integral part of ...
Hash functions are cryptographic tools that are used in various applications like digital signature,...
The objective of this paper is to design a new secure hash algorithm with final hash code length 512...
Today, security is important on the network. Therefore, the security is provided by the nature of on...
Hash functions play an important role in a branch of information secret. The hash algorithm provides...
Cryptographic hash function is an important cryptographic tool in the field of information security....
Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate ou...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Cryptographic Hash Functions are main building block of message integrity. These functions have many...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
Cryptographic hash functions are an important building block for a wide range of applications such a...
Crypto graphic hash functions are an important building block for a wide range of applications such ...