Abstract

SHA-512 and Whirlpool are two distinct hashing algorithms in the cryptography domain. Although they are different, these methods share some characteristics; such as both of them produce secure digests of the same size. In addition, being increasingly used for sustaining the integrity of confidential files. As a result, it is crucial to explore a method to contrast and compare their performance. This paper presents a comparative analysis of SHA-512 and Whirlpool, in terms of: time consumption, avalanche effect, and resistance to collision. It also investigates their suitability in the context of File Integrity Monitoring. Our results reveal that Whirlpool outperforms SHA-512 in the avalanche effect scenario, whereas a comparable resistance to the collision behavior is exhibited. Regarding time consumption, it is slower than SHA-512. However, this positively reflects its resistance to brute force attacks.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.