Open Access
Subscription Access
Review of SHA-1 Encryption Algorithm
Abstract
In the security world, encryption is the popularly known method for protection and safety of data. Digital signature and message authentication are the widely known applications of hashing that require the hash value calculation. Sha-1 is amongst the most trusted algorithms for calculating hash values. Sha-1 takes any size of input and yields fixed size hash value of 160 bits after going through 80 rounds. Belonging to MD4 family sha-1 provides tremendous level of security.
Keywords: Hashing, HMAC, message digest, padding
Cite this Article
Poonam Dabas, Sonam Bhardwaj, Preeti Malik. Review of SHA-1 Encryption Algorithm. Journal of Advances in Shell Programming. 2016; 3(3): 1–4p.
Full Text:
PDFRefbacks
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/