Comparison of Hash Function Algorithms Against Attacks: A Review
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 8
Abstract
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks.
Authors and Affiliations
Ali Maetouq, Salwani Mohd Daud, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas
Android Malware Detection & Protection: A Survey
Android has become the most popular smartphone operating system. This rapidly increasing adoption of Android has resulted in significant increase in the number of malwares when compared with previous years. There exist l...
Community Detection in Networks using Node Attributes and Modularity
Community detection in network is of vital importance to find cohesive subgroups. Node attributes can improve the accuracy of community detection when combined with link information in a graph. Community detection using...
Block Wise Data Hiding with Auxilliary Matrix
This paper introduces a novel method based on auxiliary matrix to hide a text data in an RGB plane. To hide the data in RGB planes of image via scanning, encryption and decryption. To enhance the security, the scanning t...
Towards a Real Time Energy Management Strategy for Hybrid Wind-PV Power System based on Hierarchical Distribution of Loads
Energy management is a crucial aspect for achieving energy efficiency within a Hybrid Renewable energy power station. Load being unbalanced through the day, a reasonable power management can avoid energy dissipation and...
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in t...