Abstract— HashFunctions are vital apparatus in data security over the web. The hashcapacities that are utilized as a part of different security relatedapplications are called cryptographic hash capacities. They acknowledge subjectivelength of information and create a normally little, settled size yield, knownas message process. They are intended to give message uprightness, i.e. on theoff chance that the message has been changed after transmission from sender andbefore it might be gotten by the comparing recipient, can be followed by thecollector, and along these lines, such a altered message can be disposed of.This property is moreover helpful in may different applications, for example,production of computerized signature and arbitrary number age and so forth. Thevast majority of the hash capacities depend on Merkle-Damgard development, forexample, MD-5, SHA-1, SHA2, SHA3 and so forth, which are definitely not hundredpercent safe from assaults. The paper examines a few of the assaults that areconceivable on this development, and subsequently on these hash capacitieslikewise confront same assaults.
Keywords: Hashing Algorithms,SHA-1, SHA-2, SHA-3, MD5