Which hash algorithm is the most hardware intensive among the following?
(a) SHA-1
(b) SHA-2
(c) MD-5
(d) Whirlpool
I have been asked this question in exam.
Origin of the question is Whirlpool Algorithm in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security