JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 7 Issue 3
March-2020
eISSN: 2349-5162

Unique Identifier

JETIR2003308

Page Number

50-53

Share This Article


Title

Comparative Study of MD5 and SHA Security Algorithm

ISSN

2349-5162

Cite This Article

"Comparative Study of MD5 and SHA Security Algorithm", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 3, page no.50-53, March-2020, Available :http://www.jetir.org/papers/JETIR2003308.pdf

Authors

Abstract

Security algorithms enables secure communication between two parties in the presence of a third-Party or a snooper. It guarantees the recipient of the message of the genuineness of the received message, protects the message against the unauthorized release of the message content by the third party, only authorized users can access the data. MD5 and (SHA), cryptographic hash algorithms are one-way hashing functions which are easier to compute/convert but are much harder to reverse and would take around millions of years to compute the authentic message content. This research paper analyses the two hash algorithms, MD5 and SHA, using various key features. Their features have also been highlighted in order to provide a better comparison picture so that they can understand which algorithm has superseded the other.

Key Words

Security, cryptography, hash algorithm, MD5, SHA

Cite This Article

"Comparative Study of MD5 and SHA Security Algorithm", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 3, page no. pp50-53, March-2020, Available at : http://www.jetir.org/papers/JETIR2003308.pdf

Publication Details

Published Paper ID: JETIR2003308
Registration ID: 230159
Published In: Volume 7 | Issue 3 | Year March-2020
DOI (Digital Object Identifier):
Page No: 50-53
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"Comparative Study of MD5 and SHA Security Algorithm", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 3, page no. pp50-53, March-2020, Available at : http://www.jetir.org/papers/JETIR2003308.pdf




Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00016

Print This Page

Current Call For Paper