期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:6
页码:7376-7379
出版社:TechScience Publications
摘要:This paper is concerned with giving both an overview of the performance analysis of hash functions in cryptography and a presentation of file integrity in mobile phones. Cryptographic hash functions are a very useful tool in cryptography. They are applied in many areas like integrity of messages, storage of passwords securely and protect signatures. The three hash algorithms SHA-1, SHA-512 and MD5 are considered to analyze their performance. Hash functions are widely used to verify file integrity. And, it is clear that the message digest is used to verify the integrity of the document. Indeed, it certifies that the document has not been modified somewhere between the moment it was sent and the moment it was received. We analysed the performance of three algorithms on 32 bit processor and identified the SHA-1 has best performance; the same algorithm is used in file integrity.