Evaluation and Categorization of Hashing Algorithms Based on Their Applications

Kaydedildi:
Detaylı Bibliyografya
Yayımlandı:IAENG International Journal of Applied Mathematics vol. 55, no. 3 (Mar 2025), p. 540
Yazar: Patra, Suparn Padma
Diğer Yazarlar: Rani, Mamta
Baskı/Yayın Bilgisi:
International Association of Engineers
Konular:
Online Erişim:Citation/Abstract
Full Text
Full Text - PDF
Etiketler: Etiketle
Etiket eklenmemiş, İlk siz ekleyin!

MARC

LEADER 00000nab a2200000uu 4500
001 3185287428
003 UK-CbPIL
022 |a 1992-9978 
022 |a 1992-9986 
035 |a 3185287428 
045 2 |b d20250301  |b d20250331 
100 1 |a Patra, Suparn Padma  |u Research Scholar at the Department of Computer Science, Central University of Rajasthan, Dist-Ajmer, 305817, Rajasthan, India 
245 1 |a Evaluation and Categorization of Hashing Algorithms Based on Their Applications 
260 |b International Association of Engineers  |c Mar 2025 
513 |a Journal Article 
520 3 |a Cryptographic hash algorithms are crucial in the fast expanding field of digital security in maintaining data integrity and authenticity. With a focus towards their uses in many fields, this study evaluates and classifies cryptographic hash functions. Based on their strengths and weaknesses in ensuring data integrity, security, and efficiency, a thorough comparison study evaluates at the performance, security, and usability of several hash techniques. Key domains where cryptographic hash is applied-including cryptographic security, data management, authentication, blockchain technology, and forensic analysis-are found by the study. This work attempts to fill the literature gap on the thorough assessment of hash systems by providing a methodical classification based on construction type, standardising, compatibility, and sensitivity to input modifications. Our results support the discipline of digital cryptography by offering understanding of the choice of suitable hash algorithms for particular uses, considering the differences between security, efficiency, and adaptability to quantum attacks. 
610 4 |a National Institute of Standards & Technology 
653 |a Cryptography 
653 |a Data management 
653 |a Data integrity 
653 |a Performance evaluation 
653 |a Security 
653 |a Chaos theory 
653 |a Hash based algorithms 
653 |a Cybersecurity 
653 |a Blockchain 
653 |a Algorithms 
653 |a Integrity 
653 |a Digital signatures 
653 |a Efficiency 
700 1 |a Rani, Mamta  |u Professor at the Department of Computer Science, Central University of Rajasthan, Dist-Ajmer, 305817, Rajasthan, India 
773 0 |t IAENG International Journal of Applied Mathematics  |g vol. 55, no. 3 (Mar 2025), p. 540 
786 0 |d ProQuest  |t Computer Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3185287428/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3185287428/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3185287428/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch