In: Computer Science
Research the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD) and then compare them. Do a write up on the each one of them (3 paragraphs total). Be sure to include the size of the digest, the number of rounds needed to create the hash, block size, who created it, what previous hash it was derived from, and its strengths and weaknesses. For your fourth paragraph, pick one hash algorithm and explain what you would use it for and why you would prefer to use that hash.
Be creative. I am looking for thoughtful responses, they do not necessarily have to be true.
Research on the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD)
1 Message Digest: A message digest is defined as a cryptographic hash function that contains the string of digits that are created by the one-way hashing formula.The message digest is designed in such a way that it protect the integrity of a piece of data or to detect any changes and alterations that takes place in any part of the media.In message digest the hash number basically represent the specific files that are contained for the protected works.
2 Secure Hash Algorithm: The secure hash algoritm is also called the SHA.This is the family of cryptographic functions, that are designed in such a way that keep the data secured.This is work in such a way that the data are transfered using a hash function.This is an algoritm that consists of the modular additions,bit-wise operation and the compression functions.
3 RIPMD: This RIPMD, stands for the RACE Integrity Primitives Evaluation Message Digest.This is basicaiiy a group of a hash function.This is used in the Bitcoin standard.
Comparision between the different algorithms like Message Digest, Secure Hash Algorithm, and RIPMD:
Message Digest Secure Hash Algorithm RIPMD
1 The digest length: 128 bits 160 bits 160 bits
2 Numbers of steps: 64(4 rounds of 16) 80(4 rounds of the 20) 160(The 5 paired round of 16)
3The basis unit of processing:512 bits 512 bits 512 bits
4 The maximum message size: infinity(~) 2^64-1 bits 2^64-1 bits
5 Strengths :The error-checking functionality It also error-checking functionality Similar functions as SHA-1
6 Weaknesses :No collision resistant No collision resistant No collision resistant,
According to me i choose Secure hash algorithm .Because as we know that it is a family of the cyptographic functions this is designed in such a way that it keep data secured.It basically work by transfering the data using a hash function.This hash function then produces the fixed-size string this seems like the original.This algoritm are designed in such a way that to be one-way functions,it means that it transformed only into their respective hash values.
The most common application of SHA is that it is used for the encrypting passwords.It has the error-checking functionality.The best thing about the SHA is that it is fastest hashing function.This has the longer hash value that makes it harder to break.So , all this points we can say that it is most secure hash algorithm.
THANKS , i think this will give you a better intuition about your questions. If you have any doubt feel free to ask in the comment section.