The goal of security is to provide data confidentiality, integrity and availability. Hash algorithm is used to address issues on integrity through authentication scheme. The Secure Hash Algorithm – 3 is the most recent and strong algorithm adopted by the National Institute of Standards and Technology (NIST). The study has shown the performance analysis and compares variance of SHA-3 (224, 256, 384 and 512). The result of the study shows that for short message, the SHA-3 384 variant performs better with a strong avalanche effect of 51% while SHA-3 512 variant performs well on long message with 50% avalanche effect. This signifies that it is much appropriate that either SHA-3 384 or 512 be applied to make an operation secure.
Volume 11 | 11-Special Issue
Pages: 960-966
DOI: 10.5373/JARDCS/V11SP11/20193121