download_pdf_ijert
Authors : Priyamvada Saxena.

Volume/Issue :-
 Volume 3 Issue 5

Google Scholar :-
 https://goo.gl/DF9R4u

Scribd :- 
https://goo.gl/PjeSmJ>

Thomson Reuters :- https://goo.gl/3bkzwv

Hash function has become a basic tool of modern networking. It is a mathematical tool used for identity authorization, secure flow of data in the network. Hashing is also used in the encryption and decryption of digital signatures. It is a tool that converts numerical input value into a compressed numerical value. Input to a hash module is of arbitrary length but its output is of fixed length. This paper presents the analysis and theoretical overview of various hash function and time conversion analysis of all the hash algorithms.
Keywords:- cryptography, hash function, time conversion analysis.