Cryptographic hash function: A high level view
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, const...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/36069/ http://irep.iium.edu.my/36069/ http://irep.iium.edu.my/36069/ http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf |
Summary: | Cryptographic hash function verifies data integrity and
sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an
overview of a selected dedicated cryptographic hash function. |
---|