Understanding Hashing in Cryptocurrency Systems π
Explore the fundamental principles and research insights into hashing mechanisms in crypto systems. Download the full article for a deep dive!

IJERT
1 views β’ Feb 26, 2022

About this video
πDownload Articleπ
https://www.ijert.org/research-intuitions-of-hashing-crypto-system
IJERTV9IS120185
Research Intuitions of Hashing Crypto System
Rojasree V , Gnana Jayanthi J , Christy Sujatha. D
Data transition over the internet has become inevitable. Most data transmitted in the form of multimedia. The data transmission must be less complex and user friendly at the same time with more security. Message authentication and integrity is one of the major issues in security data Transmission. There are plenty of methods used to ensure the integrity of data when it is send from the receiver and before it reaches the corresponding receiver. If these messages are tampered in the midst, it should be intimated to the receiver and discarded. Hash algorithms are supposed to provide the integrity but almost all the algorithms have confirmed breakable or less secure. In this review, the performances of various hash functions are studied with an analysis from the point of view of various researchers.
https://www.ijert.org/research-intuitions-of-hashing-crypto-system
IJERTV9IS120185
Research Intuitions of Hashing Crypto System
Rojasree V , Gnana Jayanthi J , Christy Sujatha. D
Data transition over the internet has become inevitable. Most data transmitted in the form of multimedia. The data transmission must be less complex and user friendly at the same time with more security. Message authentication and integrity is one of the major issues in security data Transmission. There are plenty of methods used to ensure the integrity of data when it is send from the receiver and before it reaches the corresponding receiver. If these messages are tampered in the midst, it should be intimated to the receiver and discarded. Hash algorithms are supposed to provide the integrity but almost all the algorithms have confirmed breakable or less secure. In this review, the performances of various hash functions are studied with an analysis from the point of view of various researchers.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1
Duration
22:42
Published
Feb 26, 2022
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.