Skip to main content

A Journey from MD5 to SHA-3

  • Conference paper
  • First Online:
Trends in Communication, Cloud, and Big Data

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 99))

Abstract

If X is sender of a message and Y is the receiver of the same, then X encrypts the same with Y’s public key and then sends the encrypted data to Y. It confirms about authenticity and authorization of receiver. If X sends message and Y receives, X encrypts the message with X’s private key and sends the encrypted data to Y. It confirms authenticity and authorization of the sender [1]. Such a schema could work properly. It involves the usage of a message digest or hash. Hash is a fingerprint or the summary of the message. It carries similar concept of cyclic redundancy check (CRC). Integrity of the data is verified with this process. This process actually confirms that the data should not be damaged between the path of sender and receiver [2]. Hashing confirms few things like (i) complexity of calculation of hash value of a message should be decreased; (ii) it follows a one-way encrypting procedure or technique; and (iii) different hash values should be generated by a particular hashing technique for any two different messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kahate A (2013) Cryptography and network security, 3rd edn. McGraw-Hill

    Google Scholar 

  2. Stallings W (2017) Cryptography and network security. Pearson

    Google Scholar 

  3. Khan E, El-Kharashi MW, Gebali F, Abd-El-Barr M (2007) Design and performance analysis of a unified, reconfigurable HMAC-hash unit. IEEE Trans Circuits Syst I Regul Pap 54(12):2683–2695. https://doi.org/10.1109/tcsi.2007.910539

    Article  Google Scholar 

  4. Bettilyon TE (2017) An introduction to hashing in the era of machine learning. Published by the researchers of Google and MIT, Dec 2017

    Google Scholar 

Download references

Acknowledgements

We thank to all the experts who have developed and designed the template.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandip Ghoshal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghoshal, S., Bandyopadhyay, P., Roy, S., Baneree, M. (2020). A Journey from MD5 to SHA-3. In: Sarma, H., Bhuyan, B., Borah, S., Dutta, N. (eds) Trends in Communication, Cloud, and Big Data. Lecture Notes in Networks and Systems, vol 99. Springer, Singapore. https://doi.org/10.1007/978-981-15-1624-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1624-5_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1623-8

  • Online ISBN: 978-981-15-1624-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics