This study compares different hashing encryption algorithms and provides several suggestions about how to choose different hashing encryption algorithms for particular cases. This paper presents three different kinds of hashing encryption algorithms. The author introduces the fundamental conceptions of these algorithms and their application. The author also computes some significant factors in computer science and compares these algorithms by mathematical quantity computing data. This article discusses the advantages and disadvantages of hashing encryption algorithms and proposes its potential value in the future.
CITATION STYLE
Long, S. (2019). A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512. In Journal of Physics: Conference Series (Vol. 1314). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1314/1/012210
Mendeley helps you to discover research relevant for your work.