2022 IEEE World AI IoT Congress (AIIoT) 2022
DOI: 10.1109/aiiot54504.2022.9817185
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Study of Sha-256 Optimization Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…It accepts any size input (or message) and generates a fixed-size 256-bit hash value that provides a unique representation of the original data. Several sophisticated procedures are involved in this process, including message padding, parsing, and multiple rounds of mathematical computations (Rawal, Kumar, Maganti, & Godha, 2022). Bitwise rotations, modular additions, and logical functions are among the essential operations.…”
Section: Sha-256mentioning
confidence: 99%
“…It accepts any size input (or message) and generates a fixed-size 256-bit hash value that provides a unique representation of the original data. Several sophisticated procedures are involved in this process, including message padding, parsing, and multiple rounds of mathematical computations (Rawal, Kumar, Maganti, & Godha, 2022). Bitwise rotations, modular additions, and logical functions are among the essential operations.…”
Section: Sha-256mentioning
confidence: 99%
“…These functions work in a deterministic fashion but generate pseudo-random results, making the computation of the algorithm the only feasible way to obtain the output hash (also called digest). A hash function is considered secure if it exhibits the properties of being one-way and collision-resistant [2]. Therefore, these functions require significant computational resources to process the input data and produce the correct output hash.…”
Section: Introductionmentioning
confidence: 99%
“…The SHA-256 algorithm is a popular cryptographic hash function widely used for password hashing, data fingerprinting, digital signatures, and cryptocurrencies like Bitcoin [2]. The algorithm is part of the Secure Hash Algorithm 2 (SHA-2) family, created and published by the National Institute of Standards and Technology (NIST) in 2002 [3].…”
Section: Introductionmentioning
confidence: 99%