Evaluation and Categorization of Hashing Algorithms Based on Their Applications
Kaydedildi:
| Yayımlandı: | IAENG International Journal of Applied Mathematics vol. 55, no. 3 (Mar 2025), p. 540 |
|---|---|
| Yazar: | |
| Diğer Yazarlar: | |
| Baskı/Yayın Bilgisi: |
International Association of Engineers
|
| Konular: | |
| Online Erişim: | Citation/Abstract Full Text Full Text - PDF |
| Etiketler: |
Etiket eklenmemiş, İlk siz ekleyin!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3185287428 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1992-9978 | ||
| 022 | |a 1992-9986 | ||
| 035 | |a 3185287428 | ||
| 045 | 2 | |b d20250301 |b d20250331 | |
| 100 | 1 | |a Patra, Suparn Padma |u Research Scholar at the Department of Computer Science, Central University of Rajasthan, Dist-Ajmer, 305817, Rajasthan, India | |
| 245 | 1 | |a Evaluation and Categorization of Hashing Algorithms Based on Their Applications | |
| 260 | |b International Association of Engineers |c Mar 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Cryptographic hash algorithms are crucial in the fast expanding field of digital security in maintaining data integrity and authenticity. With a focus towards their uses in many fields, this study evaluates and classifies cryptographic hash functions. Based on their strengths and weaknesses in ensuring data integrity, security, and efficiency, a thorough comparison study evaluates at the performance, security, and usability of several hash techniques. Key domains where cryptographic hash is applied-including cryptographic security, data management, authentication, blockchain technology, and forensic analysis-are found by the study. This work attempts to fill the literature gap on the thorough assessment of hash systems by providing a methodical classification based on construction type, standardising, compatibility, and sensitivity to input modifications. Our results support the discipline of digital cryptography by offering understanding of the choice of suitable hash algorithms for particular uses, considering the differences between security, efficiency, and adaptability to quantum attacks. | |
| 610 | 4 | |a National Institute of Standards & Technology | |
| 653 | |a Cryptography | ||
| 653 | |a Data management | ||
| 653 | |a Data integrity | ||
| 653 | |a Performance evaluation | ||
| 653 | |a Security | ||
| 653 | |a Chaos theory | ||
| 653 | |a Hash based algorithms | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Blockchain | ||
| 653 | |a Algorithms | ||
| 653 | |a Integrity | ||
| 653 | |a Digital signatures | ||
| 653 | |a Efficiency | ||
| 700 | 1 | |a Rani, Mamta |u Professor at the Department of Computer Science, Central University of Rajasthan, Dist-Ajmer, 305817, Rajasthan, India | |
| 773 | 0 | |t IAENG International Journal of Applied Mathematics |g vol. 55, no. 3 (Mar 2025), p. 540 | |
| 786 | 0 | |d ProQuest |t Computer Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3185287428/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3185287428/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3185287428/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |