Please use this identifier to cite or link to this item: https://elibrary.tucl.edu.np/handle/123456789/14787
Title: Analysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1
Authors: Gautam, Sudhir
Keywords: Dedicated Cryptographic;Hash Functions MD5
Issue Date: 2011
Publisher: Department of Computer Science and I.T.
Institute Name: Central Department of Computer Science and Information Technology
Level: Masters
Abstract: Cryptography is the art and science of information security and Cryptographic hash functions are one of the most important tools used in modern cryptography. A hash function is a transformation function that maps strings of arbitrary length to strings of fixed length. For the last two decades, many types of hash functions have been defined but, the most widely used in many of the cryptographic applications currently are hash functions based on block ciphers and the dedicated hash functions. This dissertation shows how dedicated hash functions are constructed and what are their design principles and where they can be used. This dissertation also looks into a comparison between two dedicated hash algorithms. It has been observed that the MD5 algorithm is slightly cheaper to compute than SHA-1.
URI: https://elibrary.tucl.edu.np/handle/123456789/14787
Appears in Collections:Computer Science & Information Technology

Files in This Item:
File Description SizeFormat 
Cover.pdf61.55 kBAdobe PDFView/Open
Chapter.pdf393.97 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.