@article{MAKHILLJMC20071424923, title = {Security (GCSEC) Algorithm for non Real Time Data in Mobile Networks}, journal = {Journal of Mobile Communication}, volume = {1}, number = {4}, pages = {109-113}, year = {2007}, issn = {1990-794x}, doi = {jmcomm.2007.109.113}, url = {https://makhillpublications.co/view-article.php?issn=1990-794x&doi=jmcomm.2007.109.113}, author = {M. Ganaga Durga,G. Chandrasekaran and}, keywords = {Refuge,hash utility,psychiatry,hacking tempo,digest}, abstract = {The focal hub delves into conniving an proficient 256-bit hash utility to shield the non real time data and its hacking echelon is compared with the hash algorithms. This study investigates the recital of hashing algorithms by an untried loom. Hash functions have ample and imperative role in cryptography. They generate hash ethics, which succinctly embody longer messages or credentials from which they were computed. The focal task of cryptographic hash functions is in the stipulation of message veracity checks and digital signatures. This algorithm utterly secures the non real time data by encrypting the data what is sent or time-honored.} }