Please use this identifier to cite or link to this item:
https://elibrary.tucl.edu.np/handle/123456789/14787
Title: | Analysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1 |
Authors: | Gautam, Sudhir |
Keywords: | Dedicated Cryptographic;Hash Functions MD5 |
Issue Date: | 2011 |
Publisher: | Department of Computer Science and I.T. |
Institute Name: | Central Department of Computer Science and Information Technology |
Level: | Masters |
Abstract: | Cryptography is the art and science of information security and Cryptographic hash functions are one of the most important tools used in modern cryptography. A hash function is a transformation function that maps strings of arbitrary length to strings of fixed length. For the last two decades, many types of hash functions have been defined but, the most widely used in many of the cryptographic applications currently are hash functions based on block ciphers and the dedicated hash functions. This dissertation shows how dedicated hash functions are constructed and what are their design principles and where they can be used. This dissertation also looks into a comparison between two dedicated hash algorithms. It has been observed that the MD5 algorithm is slightly cheaper to compute than SHA-1. |
URI: | https://elibrary.tucl.edu.np/handle/123456789/14787 |
Appears in Collections: | Computer Science & Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cover.pdf | 61.55 kB | Adobe PDF | View/Open | |
Chapter.pdf | 393.97 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.