Improvisation in SHA Algorithm

SHA-2 is a secure hash function and a successor to the SHA-l algorithm. It is designed to be more secure and resistant to attack. SHA-2 is resistant to a variety of attacks, including collisions, preimages, and second-preimages. The security of SHA-2 is based on its design and implementation. The de...

Full description

Saved in:
Bibliographic Details
Published in2023 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE) pp. 1 - 4
Main Authors S, Sangheethaa, Korath, Arun, C, Ranjana
Format Conference Proceeding
LanguageEnglish
Published IEEE 08.11.2023
Subjects
Online AccessGet full text
DOI10.1109/RASSE60029.2023.10363491

Cover

More Information
Summary:SHA-2 is a secure hash function and a successor to the SHA-l algorithm. It is designed to be more secure and resistant to attack. SHA-2 is resistant to a variety of attacks, including collisions, preimages, and second-preimages. The security of SHA-2 is based on its design and implementation. The design of SHA-2 includes a large message block size, large number of rounds, and a complex round function design. These features make it very difficult for an attacker to find collisions or preimages for SHA-2. The implementation of SHA-2 must be careful to avoid side-channel attacks, which are a type of attack that exploits information that is leaked during the execution of a cryptographic algorithm. The security of SHA-2 has been evaluated by a number of independent organizations. These organizations have concluded that SHA-2 is a secure hash function. However, it is important to note that no hash function is completely secure. As technology advances, it is possible that new attacks will be developed against SHA-2. This paper analyses the advantages and disadvantages of SHA-2 algorithm and proposes some mechanisms to improve the security further.
DOI:10.1109/RASSE60029.2023.10363491