Comparative Analysis of Cryptographic Hash Functions
Hash Functions play a very crucial role in the area of Network Security and Cryptography. The major issues to which any hash algorithms deal with, are to check the Integrity, Authenticity of Data which is transmitting between parties and Users with digital signatures. Hash function also used for key generation in Symmetric and Public Key Cryptosystems. Different level of security provided by different algorithms depending on how difficult is to break them. The most well-known hash algorithms are MD4, MD5, SHA-1, SHA-2 and SHA-3, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav etc. In this paper we are discussing importance of hash functions, description about various well known hash functions widely used, various attacks applicable on hash functions, and comparative analysis of various hash algorithms and progressive implementation in this area.
Keywords - Algorithms; Encryption; Decryption; Cipher; Confidentiality; Integity; Authentication; Server; Message-Digest, Message-Block;