Professional Documents
Culture Documents
MD4
MD5
SHA-1
SHA-2
MAC
KEYED-MAC
MD4(Message Digest Algorithm 4)
• The most widely used hash function has been the Secure Hash Algorithm
(SHA). Indeed, because virtually every other widely used hash function
had been found to have substantial cryptanalytic weaknesses.
• Stallings, W. (2011). Cryptography and network security, principles and practice. United States
of America: Pearson Education, Inc.