Secure Hashing: SHA-1, SHA-2, and SHA-3

Authored by: Deniz Toz , Ricardo Chaves , Leonel Sousa , Nicolas Sklavos , Apostolos P. Fournaris , Georgina Kalogeridou , Paris Kitsos , Farhana Sheikh

Circuits and Systems for Security and Privacy

Print publication date:  May  2016
Online publication date:  May  2016

Print ISBN: 9781482236880
eBook ISBN: 9781482236897
Adobe ISBN:

10.1201/b19499-5

 Download Chapter

 

Abstract

A hash function is a cryptographic operation that converts a variable length input message to a fixed output called message hash or message digest. Hash functions can mostly be found in authentication schemes, random number generators, data integrity mechanisms, and digital signatures.

 Cite
Search for more...
Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.