2018
DOI: 10.14569/ijacsa.2018.090813
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Hash Function Algorithms Against Attacks: A Review

Abstract: Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0
1

Year Published

2019
2019
2025
2025

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 24 publications
1
10
0
1
Order By: Relevance
“…Using IaaS, cloud users possess much control over security as long as there are no security loopholes in the virtual machine monitor. Users have full control over the software's running in remote located virtual machines, however, the underlying network, compute and storage infrastructure is fully controlled by CSP (12). CSP deploys substantial efforts to secure their infrastructure from malicious entities, but still there are many security issues related to data in cloud data storage systems.…”
Section: Data Security In Cloud Data Storagementioning
confidence: 99%
“…Using IaaS, cloud users possess much control over security as long as there are no security loopholes in the virtual machine monitor. Users have full control over the software's running in remote located virtual machines, however, the underlying network, compute and storage infrastructure is fully controlled by CSP (12). CSP deploys substantial efforts to secure their infrastructure from malicious entities, but still there are many security issues related to data in cloud data storage systems.…”
Section: Data Security In Cloud Data Storagementioning
confidence: 99%
“…It is proposed that the integer associated with this string, K, be the encryption key. Because of the characteristics of the Sha-512 function, every time an image is encrypted the keys are probably different; that is, the probability of collision is very low [33], [57]. So, the number of elements in the key set is ≈ 2 512 .…”
Section: Encryption Proceduresmentioning
confidence: 99%
“…The various successful attacks launched on cryptographic hash functions like MD4, MD5 and SHA-160 algorithms prove the structural flaw of these functions [14][15] [16]. The partial breaking of families of SHA2 and SHA3 proves the structural flaw was not due to RO and Sponge design principles [17]. JS Teh et al proposed chaotic hash function based on fixed point representation [18].…”
Section: Related Workmentioning
confidence: 99%