Analysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1

dc.contributor.authorGautam, Sudhir
dc.date.accessioned2023-02-02T10:36:44Z
dc.date.available2023-02-02T10:36:44Z
dc.date.issued2011
dc.description.abstractCryptography is the art and science of information security and Cryptographic hash functions are one of the most important tools used in modern cryptography. A hash function is a transformation function that maps strings of arbitrary length to strings of fixed length. For the last two decades, many types of hash functions have been defined but, the most widely used in many of the cryptographic applications currently are hash functions based on block ciphers and the dedicated hash functions. This dissertation shows how dedicated hash functions are constructed and what are their design principles and where they can be used. This dissertation also looks into a comparison between two dedicated hash algorithms. It has been observed that the MD5 algorithm is slightly cheaper to compute than SHA-1.en_US
dc.identifier.urihttps://hdl.handle.net/20.500.14540/14787
dc.language.isoen_USen_US
dc.publisherDepartment of Computer Science and I.T.en_US
dc.subjectDedicated Cryptographicen_US
dc.subjectHash Functions MD5en_US
dc.titleAnalysis of Dedicated Cryptographic Hash Functions–MD5 and SHA-1en_US
dc.typeThesisen_US
local.academic.levelMastersen_US
local.institute.titleCentral Department of Computer Science and Information Technologyen_US

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
Cover.pdf
Size:
61.55 KB
Format:
Adobe Portable Document Format
Description:
Loading...
Thumbnail Image
Name:
Chapter.pdf
Size:
393.97 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: