SHA-1 and MD5 Cryptographic Hash Functions: Security Overview [PDF]
Communications, 2015Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +5 more sources
Security Properties of Domain Extenders for Cryptographic Hash Functions [PDF]
Journal of Information Processing Systems, 2010Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of
Elena Andreeva+2 more
semanticscholar +4 more sources
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
Сучасні інформаційні системи, 2019The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova+3 more
doaj +6 more sources
Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions
IEEE Access, 2022The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity.
Susila Windarta+4 more
doaj +2 more sources
A Cryptographic Iterative Hash Function Scheme for Wireless Sensor Network (WSNs) Security Enhancement for Sensor Data Transmission in Blockchain [PDF]
, 2022<p>The study will shed light on the proposed system of WSN security for the sensor data transmission using the blockchain. The system will be presented according to the research and practical implications of the blockchain systems. The paper proposes a method for enhancing the data security of wireless sensor networks based on blockchain ...
Mohammed Rajhi
+7 more sources
Merkle-Damgård Construction Method and Alternatives: A Review [PDF]
Journal of Information and Organizational Sciences, 2017Cryptographic hash function is an important cryptographic tool in the field of information security. Design of most widely used hash functions such as MD5 and SHA-1 is based on the iterations of compression function by Merkle-Damgård construction method ...
Harshvardhan Tiwari
doaj +3 more sources
Security of a New Cryptographic Hash Function - Titanium [PDF]
Indonesian Journal of Electrical Engineering and Computer Science, 2018This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced. Basic security criteria of random function have been presented and studied on Titanium and then, differential cryptanalysis on ...
Abdullah Nazeeh Saleh+1 more
openalex +4 more sources
Verification of Implementations of Cryptographic Hash Functions
IEEE Access, 2017Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +2 more sources
Theoretical and Experimental Analysis of Cryptographic Hash Functions
Journal of Telecommunications and Information Technology, 2019The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk+1 more
doaj +2 more sources
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions
Information, 2022With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information. Therefore, this study employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for ...
Emmanuel A. Adeniyi+4 more
openaire +3 more sources