Archives

Comparative and Security Performance Analysis of SHA-3


Christine Charmaine G. San Jose
Abstract

The goal of security is to provide data confidentiality, integrity and availability. Hash algorithm is used to address issues on integrity through authentication scheme. The Secure Hash Algorithm – 3 is the most recent and strong algorithm adopted by the National Institute of Standards and Technology (NIST). The study has shown the performance analysis and compares variance of SHA-3 (224, 256, 384 and 512). The result of the study shows that for short message, the SHA-3 384 variant performs better with a strong avalanche effect of 51% while SHA-3 512 variant performs well on long message with 50% avalanche effect. This signifies that it is much appropriate that either SHA-3 384 or 512 be applied to make an operation secure.

Volume 11 | 11-Special Issue

Pages: 960-966

DOI: 10.5373/JARDCS/V11SP11/20193121