
A Survey: Cryptographic Hash Functions for Digital Stamping
Author(s) -
Israa Ezzat Salem,
Adil M. A. Salman,
Maad M. Mijwil
Publication year - 2019
Publication title -
xi'nan jiaotong daxue xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 21
ISSN - 0258-2724
DOI - 10.35741/issn.0258-2724.54.6.2
Subject(s) - cryptographic hash function , computer science , hash function , digital signature , sha 2 , security of cryptographic hash functions , cryptography , secure hash algorithm , hash based message authentication code , theoretical computer science , cryptographic primitive , hash chain , merkle tree , message authentication code , double hashing , cryptographic protocol , computer security
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature. Functions of the cryptographic hash are an important tool applied in several sections of data security, and application of hash function is common and used for various purposes such as File Integrity Verification, Key Derivation, Time stamping, Password Hashing, Rootkit Detection and Digital Signature. Digital Signature is a code that is linked electronically with the document including the sender's identity. Therefore, the digital signature is of high value in verifying digital messages or documents. Cryptographic hash functions do not present without mathematics. The success of computer science is attributed to mathematics; in other words, it is because of mathematical science, that computer science was understood and could be explained to all. The study aims to teach the reader hash functions and its applications such as digital signature and to show in details some hash functions and their designing.