A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512

18Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This study compares different hashing encryption algorithms and provides several suggestions about how to choose different hashing encryption algorithms for particular cases. This paper presents three different kinds of hashing encryption algorithms. The author introduces the fundamental conceptions of these algorithms and their application. The author also computes some significant factors in computer science and compares these algorithms by mathematical quantity computing data. This article discusses the advantages and disadvantages of hashing encryption algorithms and proposes its potential value in the future.

Cite

CITATION STYLE

APA

Long, S. (2019). A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512. In Journal of Physics: Conference Series (Vol. 1314). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1314/1/012210

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free