Tuesday, October 15, 2019

Hashing Algorithms Information Technology Research Paper

Hashing Algorithms Information Technology - Research Paper Example Apart from these algorithms, Whirlpool, Bloom Filters and other algorithms are also widely used. Hashing algorithms are selected based on their efficiency. These hash algorithms depend on a set of hash functions that generate the key values which are in turn stored in a separate table known as the Hash Table. This table follows a unique pattern based on which the values generated in the hash functions are stored. The main aim of a Hashing algorithm is to simplify the intended process and to provide a hassle free operation of the process. By using a hashing algorithm, one can be sure that the data is completely secure. A hashing algorithm tries to solve the complex functionalities by generating a simple function which can be used in place of these complex issues. Origin The hashing algorithm has been in use for many years and almost all the fields make use of these hashing algorithms to help them resolve and simplify their process. Hashing algorithms are generally used to generate a k ey value or a specified format of number or text to enable the administrator to propose a certain level to the specified data. Given a set of data, a hash function is selected and implemented to produce the hash values. The various types of hashing functions like string hashing, hashing functions for encrypting data and other mathematical values. (Sedgewick & Wyne, 2011). The concept of string hashing is mainly used in database that stores the initial information pertaining to a particular file. The next form is cryptographic hashing, which is used in data conversion and user authentication. The original form of the data is changed by using any of the cryptographic or encryption algorithms, providing a secure environment to the data that is stored in the file. In this function, the original form of the data is changed to the encrypted form which is not readable by the regular user. If a person wants to access that particular file, he has to make use of the hashing function that decr ypts the data back to the normal form. The major idea behind this algorithm is to protect the data from outside world. Intrusion and unauthorized access is prevented, thereby giving a protective environment. This algorithm is mostly used to convert the passwords that are used by the user to enter a site or access a particular data. In this case, the encrypted form of the password is stored in the system, instead of the original password. Hence the password and other confidential information are maintained in the organizations and business environment. Though the numbers of hashing algorithms are more, only few are more efficient and effective in dealing with problems. Detailed Description Among the various hashing algorithms, SHA and MD5 algorithms are considered to be more efficient in handling any sort of data. SHA Algorithms SHA algorithm and its versions are one of the best algorithms that help in easing the functionalities and thus the functions are also same for every algorith m. The functions used in each version are different and this depends on the input value of the proposed function. The size of the input and output value also is an important factor, as each function is different in its own form. The versions include SHA1, SHA 384, SHA 256 and SHA 512. Each of these algorithms makes use of functions and constants that define the entire algorithm. These logical functions generally range from f1, f2 and ranges depending on the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.