Abstract
If X is sender of a message and Y is the receiver of the same, then X encrypts the same with Y’s public key and then sends the encrypted data to Y. It confirms about authenticity and authorization of receiver. If X sends message and Y receives, X encrypts the message with X’s private key and sends the encrypted data to Y. It confirms authenticity and authorization of the sender [1]. Such a schema could work properly. It involves the usage of a message digest or hash. Hash is a fingerprint or the summary of the message. It carries similar concept of cyclic redundancy check (CRC). Integrity of the data is verified with this process. This process actually confirms that the data should not be damaged between the path of sender and receiver [2]. Hashing confirms few things like (i) complexity of calculation of hash value of a message should be decreased; (ii) it follows a one-way encrypting procedure or technique; and (iii) different hash values should be generated by a particular hashing technique for any two different messages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kahate A (2013) Cryptography and network security, 3rd edn. McGraw-Hill
Stallings W (2017) Cryptography and network security. Pearson
Khan E, El-Kharashi MW, Gebali F, Abd-El-Barr M (2007) Design and performance analysis of a unified, reconfigurable HMAC-hash unit. IEEE Trans Circuits Syst I Regul Pap 54(12):2683–2695. https://doi.org/10.1109/tcsi.2007.910539
Bettilyon TE (2017) An introduction to hashing in the era of machine learning. Published by the researchers of Google and MIT, Dec 2017
Acknowledgements
We thank to all the experts who have developed and designed the template.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ghoshal, S., Bandyopadhyay, P., Roy, S., Baneree, M. (2020). A Journey from MD5 to SHA-3. In: Sarma, H., Bhuyan, B., Borah, S., Dutta, N. (eds) Trends in Communication, Cloud, and Big Data. Lecture Notes in Networks and Systems, vol 99. Springer, Singapore. https://doi.org/10.1007/978-981-15-1624-5_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-1624-5_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1623-8
Online ISBN: 978-981-15-1624-5
eBook Packages: EngineeringEngineering (R0)