2021 International Conference on Recent Trends on Electronics, Information, Communication &Amp; Technology (RTEICT) 2021
DOI: 10.1109/rteict52294.2021.9573660
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of MD5 and SHA-256 Algorithms to Maintain Data Integrity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…It ensures data integrity by detecting any modifications during transmission. Even a single bit change in the data would result in a different hash value, indicating tampering [8]. Utilizing ECC for key exchange and digital signatures, along with SHA-256 for data integrity, guarantees secure communication over the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…It ensures data integrity by detecting any modifications during transmission. Even a single bit change in the data would result in a different hash value, indicating tampering [8]. Utilizing ECC for key exchange and digital signatures, along with SHA-256 for data integrity, guarantees secure communication over the Internet.…”
Section: Introductionmentioning
confidence: 99%