Comparison of hash function algorithms against attacks: a review

Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authe...

Full description

Saved in:
Bibliographic Details
Main Authors: Maetouq, Ali, Mohd. Daud, Salwani, Ahmad, Noor Azurati, Maarop, Nurazean, Sjarif, Nilam Nur Amir, Abas, Hafiza
Format: Article
Language:English
Published: Science and Information Organization 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/84578/1/AliMaetouq2018_ComparisonofHashFunctionAlgorithmsAgainst.pdf
http://eprints.utm.my/id/eprint/84578/
http://dx.doi.org/10.14569/IJACSA.2018.090813
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.84578
record_format eprints
spelling my.utm.845782020-02-27T03:05:52Z http://eprints.utm.my/id/eprint/84578/ Comparison of hash function algorithms against attacks: a review Maetouq, Ali Mohd. Daud, Salwani Ahmad, Noor Azurati Maarop, Nurazean Sjarif, Nilam Nur Amir Abas, Hafiza T Technology (General) Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks. Science and Information Organization 2018 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/84578/1/AliMaetouq2018_ComparisonofHashFunctionAlgorithmsAgainst.pdf Maetouq, Ali and Mohd. Daud, Salwani and Ahmad, Noor Azurati and Maarop, Nurazean and Sjarif, Nilam Nur Amir and Abas, Hafiza (2018) Comparison of hash function algorithms against attacks: a review. International Journal of Advanced Computer Science and Applications, 9 (8). pp. 98-103. ISSN 2158-107X http://dx.doi.org/10.14569/IJACSA.2018.090813 DOI:10.14569/IJACSA.2018.090813
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T Technology (General)
spellingShingle T Technology (General)
Maetouq, Ali
Mohd. Daud, Salwani
Ahmad, Noor Azurati
Maarop, Nurazean
Sjarif, Nilam Nur Amir
Abas, Hafiza
Comparison of hash function algorithms against attacks: a review
description Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authentication and integrity of the data, including MD5, SHA-1, SHA-2, SHA-3 and RIPEMD. This paper involves an overview of these standard algorithms, and also provides a focus on their limitations against common attacks. These study shows that these standard hash function algorithms suffer collision attacks and time inefficiency. Other types of hash functions are also highlighted in comparison with the standard hash function algorithm in performing the resistance against common attacks. It shows that these algorithms are still weak to resist against collision attacks.
format Article
author Maetouq, Ali
Mohd. Daud, Salwani
Ahmad, Noor Azurati
Maarop, Nurazean
Sjarif, Nilam Nur Amir
Abas, Hafiza
author_facet Maetouq, Ali
Mohd. Daud, Salwani
Ahmad, Noor Azurati
Maarop, Nurazean
Sjarif, Nilam Nur Amir
Abas, Hafiza
author_sort Maetouq, Ali
title Comparison of hash function algorithms against attacks: a review
title_short Comparison of hash function algorithms against attacks: a review
title_full Comparison of hash function algorithms against attacks: a review
title_fullStr Comparison of hash function algorithms against attacks: a review
title_full_unstemmed Comparison of hash function algorithms against attacks: a review
title_sort comparison of hash function algorithms against attacks: a review
publisher Science and Information Organization
publishDate 2018
url http://eprints.utm.my/id/eprint/84578/1/AliMaetouq2018_ComparisonofHashFunctionAlgorithmsAgainst.pdf
http://eprints.utm.my/id/eprint/84578/
http://dx.doi.org/10.14569/IJACSA.2018.090813
_version_ 1662754277608652800
score 13.211869