Please use this identifier to cite or link to this item: https://elibrary.tucl.edu.np/handle/123456789/14787
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGautam, Sudhir-
dc.date.accessioned2023-02-02T10:36:44Z-
dc.date.available2023-02-02T10:36:44Z-
dc.date.issued2011-
dc.identifier.urihttps://elibrary.tucl.edu.np/handle/123456789/14787-
dc.description.abstractCryptography is the art and science of information security and Cryptographic hash functions are one of the most important tools used in modern cryptography. A hash function is a transformation function that maps strings of arbitrary length to strings of fixed length. For the last two decades, many types of hash functions have been defined but, the most widely used in many of the cryptographic applications currently are hash functions based on block ciphers and the dedicated hash functions. This dissertation shows how dedicated hash functions are constructed and what are their design principles and where they can be used. This dissertation also looks into a comparison between two dedicated hash algorithms. It has been observed that the MD5 algorithm is slightly cheaper to compute than SHA-1.en_US
dc.language.isoen_USen_US
dc.publisherDepartment of Computer Science and I.T.en_US
dc.subjectDedicated Cryptographicen_US
dc.subjectHash Functions MD5en_US
dc.titleAnalysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1en_US
dc.typeThesisen_US
local.institute.titleCentral Department of Computer Science and Information Technologyen_US
local.academic.levelMastersen_US
Appears in Collections:Computer Science & Information Technology

Files in This Item:
File Description SizeFormat 
Cover.pdf61.55 kBAdobe PDFView/Open
Chapter.pdf393.97 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.