2018
DOI: 10.1088/1742-6596/978/1/012116
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study of Message Digest 5(MD5) and SHA256 algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(53 citation statements)
references
References 2 publications
0
50
0
3
Order By: Relevance
“…So, in terms of storage, applying SHA-256 will increase the storage by 100% and if SHA-512 is used then storage will be increased by 400% compared to MD5. As per the findings of the authors of [26], it can be deduced that it takes an average of 1.85e-07 seconds and 5.07e-07 seconds per byte size input data execution in MD5 and SHA-256 respectively when an Intel(R) Core(TM) i5-2430M CPU @ 2,40GHz (4CPUs), 2.4 GHz architecture with 8.00 GB RAM is used. It means that SHA-256 takes approximately 2.7 times the time needed to execute the same input data compared to MD5.…”
Section: ) Computation Powermentioning
confidence: 74%
See 1 more Smart Citation
“…So, in terms of storage, applying SHA-256 will increase the storage by 100% and if SHA-512 is used then storage will be increased by 400% compared to MD5. As per the findings of the authors of [26], it can be deduced that it takes an average of 1.85e-07 seconds and 5.07e-07 seconds per byte size input data execution in MD5 and SHA-256 respectively when an Intel(R) Core(TM) i5-2430M CPU @ 2,40GHz (4CPUs), 2.4 GHz architecture with 8.00 GB RAM is used. It means that SHA-256 takes approximately 2.7 times the time needed to execute the same input data compared to MD5.…”
Section: ) Computation Powermentioning
confidence: 74%
“…The challenges and issues faced by the Internet of Things network are also addressed in [25]. The time complexity of MD5 and SHA-256 is (N ) and in terms of computation time, MD5 takes lesser time compared to the SHA-256 [26]. The output of the MD5 is 32 digit Hex irrespective of the input file size and likewise for SHA-256, the output is 64 digit Hex.…”
Section: ) Computation Powermentioning
confidence: 99%
“…The SHA256 algorithm can generate a 256-bit long hash value for data of any length [33]. A hash value is a unique and extremely compact numerical representation of a piece of data.…”
Section: Store Data On-chain and Out-of-chainmentioning
confidence: 99%
“…The Proof-of-Work mechanism in permission less Blockchain uses SHA-256 to compute BH. The time complexity of SHA-256 is O(n) [6]. For a Miner to compute BH, he/she has to check 2 256 hashes out of which only 2 k hashes are valid, where k is the number of zeroes specified by condition C. For a user to become a Miner, he/she has to compute hashes at a rate of 17.2 Th/sec as of today to achieve break even.…”
Section: Performance Of Proof-of-work With Sha-256mentioning
confidence: 99%