Comparison of Hash Function Algorithms Against Attacks: A Review

Abstract

Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks.

Authors and Affiliations

Ali Maetouq, Salwani Mohd Daud, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas

Keywords

Related Articles

Android Malware Detection & Protection: A Survey

Android has become the most popular smartphone operating system. This rapidly increasing adoption of Android has resulted in significant increase in the number of malwares when compared with previous years. There exist l...

Community Detection in Networks using Node Attributes and Modularity

Community detection in network is of vital importance to find cohesive subgroups. Node attributes can improve the accuracy of community detection when combined with link information in a graph. Community detection using...

Block Wise Data Hiding with Auxilliary Matrix

This paper introduces a novel method based on auxiliary matrix to hide a text data in an RGB plane. To hide the data in RGB planes of image via scanning, encryption and decryption. To enhance the security, the scanning t...

Towards a Real Time Energy Management Strategy for Hybrid Wind-PV Power System based on Hierarchical Distribution of Loads

Energy management is a crucial aspect for achieving energy efficiency within a Hybrid Renewable energy power station. Load being unbalanced through the day, a reasonable power management can avoid energy dissipation and...

A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture

The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in t...

Download PDF file
  • EP ID EP375442
  • DOI 10.14569/IJACSA.2018.090813
  • Views 84
  • Downloads 0

How To Cite

Ali Maetouq, Salwani Mohd Daud, Noor Azurati Ahmad, Nurazean Maarop, Nilam Nur Amir Sjarif, Hafiza Abas (2018). Comparison of Hash Function Algorithms Against Attacks: A Review. International Journal of Advanced Computer Science & Applications, 9(8), 98-103. https://europub.co.uk./articles/-A-375442