Universiti Teknologi Malaysia Institutional Repository

Comparison of hash function algorithms against attacks: a review

Maetouq, Ali and Mohd. Daud, Salwani and Ahmad, Noor Azurati and Maarop, Nurazean and Sjarif, Nilam Nur Amir and Abas, Hafiza (2018) Comparison of hash function algorithms against attacks: a review. International Journal of Advanced Computer Science and Applications, 9 (8). pp. 98-103. ISSN 2158-107X

[img]
Preview
PDF
652kB

Official URL: http://dx.doi.org/10.14569/IJACSA.2018.090813

Abstract

Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks.

Item Type:Article
Uncontrolled Keywords:Hash function algorithms, MD5, PRIMEDS160, SHA-1, SHA-2, SHA-3
Subjects:T Technology > T Technology (General)
Divisions:Razak School of Engineering and Advanced Technology
ID Code:84578
Deposited By: Yanti Mohd Shah
Deposited On:27 Feb 2020 03:05
Last Modified:27 Feb 2020 03:05

Repository Staff Only: item control page