Content area

Abstract

Cryptographic hash algorithms are crucial in the fast expanding field of digital security in maintaining data integrity and authenticity. With a focus towards their uses in many fields, this study evaluates and classifies cryptographic hash functions. Based on their strengths and weaknesses in ensuring data integrity, security, and efficiency, a thorough comparison study evaluates at the performance, security, and usability of several hash techniques. Key domains where cryptographic hash is applied-including cryptographic security, data management, authentication, blockchain technology, and forensic analysis-are found by the study. This work attempts to fill the literature gap on the thorough assessment of hash systems by providing a methodical classification based on construction type, standardising, compatibility, and sensitivity to input modifications. Our results support the discipline of digital cryptography by offering understanding of the choice of suitable hash algorithms for particular uses, considering the differences between security, efficiency, and adaptability to quantum attacks.

Full text

Turn on search term navigation

© 2025. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0/ (the“License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.