Today, security is important on the network. Therefore, the security is provided by the nature of one way functions, which is a key component of SHA (Secure Hash Algorithms). The purpose of this paper how to use SHA-256 and SHA-512 from SHA-2 alogrithms. SHA-2 is a family of two similar hash functions with different block sizes known as SHA -256 and SHA-512. They differ in the word size;SHA-256 uses 32-bits words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known as SHA-223, SHA-384, SHA-512/224 and SHA-512/256. These were also designed by the NAS.
hash file; SHA-256; SHA-512; John the Ripper tool
International Journal of Trend in Scientific Research and Development - IJTSRD having
online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International
Journal which provides rapid publication of your research articles and aims to promote
the theory and practice along with knowledge sharing between researchers, developers,
engineers, students, and practitioners working in and around the world in many areas
like Sciences, Technology, Innovation, Engineering, Agriculture, Management and
many more and it is recommended by all Universities, review articles and short communications
in all subjects. IJTSRD running an International Journal who are proving quality
publication of peer reviewed and refereed international journals from diverse fields
that emphasizes new research, development and their applications. IJTSRD provides
an online access to exchange your research work, technical notes & surveying results
among professionals throughout the world in e-journals. IJTSRD is a fastest growing
and dynamic professional organization. The aim of this organization is to provide
access not only to world class research resources, but through its professionals
aim to bring in a significant transformation in the real of open access journals
and online publishing.