Secure Hashing Algorithms and Their Comparison

A secure hashing algorithm abbreviated as SHA. SHA uses methodologies similar to those used in MD4 and MD5 to create a cryptic message but has a more complex design. Due to its intricate and conservative design, SHA is cryptographically far more ahead in the race in comparison to its predecessors, i.e. MD4 and MD5 making one of its variants to be used in crypto currency transactions. This research paper analyses different SHAs based on various factors and check if one of them could be broken down with the help of backtracking.