TY - JOUR T1 - Security (GCSEC) Algorithm for non Real Time Data in Mobile Networks AU - , M. Ganaga Durga AU - , G. Chandrasekaran AU - , S. Arivazhagan JO - Journal of Mobile Communication VL - 1 IS - 4 SP - 109 EP - 113 PY - 2007 DA - 2001/08/19 SN - 1990-794x DO - jmcomm.2007.109.113 UR - https://makhillpublications.co/view-article.php?doi=jmcomm.2007.109.113 KW - Refuge KW -hash utility KW -psychiatry KW -hacking tempo KW -digest AB - The focal hub delves into conniving an proficient 256-bit hash utility to shield the non real time data and its hacking echelon is compared with the hash algorithms. This study investigates the recital of hashing algorithms by an untried loom. Hash functions have ample and imperative role in cryptography. They generate hash ethics, which succinctly embody longer messages or credentials from which they were computed. The focal task of cryptographic hash functions is in the stipulation of message veracity checks and digital signatures. This algorithm utterly secures the non real time data by encrypting the data what is sent or time-honored. ER -