Improvisation in SHA Algorithm
SHA-2 is a secure hash function and a successor to the SHA-l algorithm. It is designed to be more secure and resistant to attack. SHA-2 is resistant to a variety of attacks, including collisions, preimages, and second-preimages. The security of SHA-2 is based on its design and implementation. The de...
Saved in:
| Published in | 2023 IEEE International Conference on Recent Advances in Systems Science and Engineering (RASSE) pp. 1 - 4 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
08.11.2023
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/RASSE60029.2023.10363491 |
Cover
| Summary: | SHA-2 is a secure hash function and a successor to the SHA-l algorithm. It is designed to be more secure and resistant to attack. SHA-2 is resistant to a variety of attacks, including collisions, preimages, and second-preimages. The security of SHA-2 is based on its design and implementation. The design of SHA-2 includes a large message block size, large number of rounds, and a complex round function design. These features make it very difficult for an attacker to find collisions or preimages for SHA-2. The implementation of SHA-2 must be careful to avoid side-channel attacks, which are a type of attack that exploits information that is leaked during the execution of a cryptographic algorithm. The security of SHA-2 has been evaluated by a number of independent organizations. These organizations have concluded that SHA-2 is a secure hash function. However, it is important to note that no hash function is completely secure. As technology advances, it is possible that new attacks will be developed against SHA-2. This paper analyses the advantages and disadvantages of SHA-2 algorithm and proposes some mechanisms to improve the security further. |
|---|---|
| DOI: | 10.1109/RASSE60029.2023.10363491 |