Cryptographic hash function: A high level view

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, const...

Full description

Bibliographic Details
Main Authors: Alkandari, Abdulaziz Ali, Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad A.
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/36069/
http://irep.iium.edu.my/36069/
http://irep.iium.edu.my/36069/
http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf
Description
Summary:Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.